Cross-reference for Mekanoid Ontology classes, object properties and data properties back to ToC

This section provides details for each class and property defined by Mekanoid Ontology.

Classes

.bash_profile and .bashrcc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.004

has super-classes
Event Triggered Execution c
is also defined as
named individual

.NET Misconfiguration: Use of Impersonationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-520

has super-classes
Incorrect Privilege Assignment c

/etc/passwd and /etc/shadowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.008

has super-classes
OS Credential Dumping c
is also defined as
named individual

Absolute Path Traversalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-36

has super-classes
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') c
has sub-classes
Path Traversal: '/absolute/pathname/here' c, Path Traversal: 'C:dirname' c, Path Traversal: '\\UNC\share\name\' (Windows UNC Share) c, Path Traversal: '\absolute\pathname\here' c

Abuse Elevation Control Mechanismc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1548

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c
has sub-classes
Bypass User Access Control c, Elevated Execution with Prompt c, Setuid and Setgid c, Sudo and Sudo Caching c

Academic Articlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AcademicArticle

has super-classes
Article c
has sub-classes
Conference Paper c, Journal Article c

Academic Paper Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AcademicPaperReference

has super-classes
Technique Reference c
has members
Reference - Analysis of the Windows Vista Security Model - Symantec Corporation ni, Reference - Continuous authentication by analysis of keyboard typing characteristics - Bradford Univ., UK ni, Reference - Dagger: Modeling and visualization for mission impact situational awareness ni, Reference - Dead code elimination ni, Reference - Detecting DDoS Attack Using Snort ni, Reference - Enhancing Network Security By Preventing User-Initiated Malware Execution - MITRE ni, Reference - Firmware Behavior Analysis ConFirm ni, Reference - Firmware Behavior Analysis VIPER ni, Reference - Firmware Embedded Monitoring Code Symbiotes ni, Reference - Indirect Branching Calls ni, Reference - Mission Dependency Modeling for Cyber Situational Awareness ni, Reference - Network-Based Buffer Overflow Detection by Exploit Code Analysis - Information Security Research Centre ni, Reference - Network-level polymorphic shellcode detection using emulation ni, Reference - Predicting Domain Generation Algorithms with Long Short-Term Memory Networks ni, Reference - Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords ni

Acceptance of Extraneous Untrusted Data With Trusted Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-349

has super-classes
Insufficient Verification of Data Authenticity c

Access Control Check Implemented After Asset is Accessedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1280

has super-classes
Improper Access Control c, Incorrect Behavior Order c

Access Control Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccessControlConfiguration

has super-classes
Configuration Resource c
has sub-classes
Access Control Group c, Access Control List c, Group Policy c
is also defined as
named individual

Access Control Groupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccessControlGroup

has super-classes
Access Control Configuration c
has sub-classes
Host Group c, User Group c
is also defined as
named individual

Access Control Listc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccessControlList

has super-classes
Access Control Configuration c
is also defined as
named individual

Access Modelingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccessModeling

has super-classes
Operational Activity Mapping c
is also defined as
named individual

Access of Memory Location After End of Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-788

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Buffer Over-read c, Heap-based Buffer Overflow c, Stack-based Buffer Overflow c

Access of Memory Location Before Start of Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-786

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Buffer Under-read c, Buffer Underwrite ('Buffer Underflow') c

Access of Resource Using Incompatible Type ('Type Confusion')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-843

has super-classes
Incorrect Type Conversion or Cast c

Access of Uninitialized Pointerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-824

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Access to Critical Private Variable via Public Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-767

has super-classes
Exposure of Resource to Wrong Sphere c

Access Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccessToken

has super-classes
Credential c
has sub-classes
Kerberos Ticket c, Ticket Granting Ticket c
has members
Token Impersonation/Theft ni
is also defined as
named individual

Access Token Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c
has sub-classes
Create Process with Token c, Make and Impersonate Token c, Parent PID Spoofing c, SID-History Injection c, Token Impersonation/Theft c

Accessibility Featuresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1015

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Accessibility Featuresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.008

has super-classes
Event Triggered Execution c
is also defined as
named individual

Account Access Removalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1531

has super-classes
Impact Technique c
is also defined as
named individual

Account Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1087

has super-classes
Discovery Technique c
has sub-classes
Email Account c

Account Lockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AccountLocking

has super-classes
Credential Eviction c
is also defined as
named individual

Account Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098

has super-classes
Persistence Technique c
has sub-classes
Add Office 365 Global Administrator Role c, Additional Azure Service Principal Credentials c, Device Registration c, Exchange Email Delegate Permissions c, SSH Authorized Keys c
is also defined as
named individual

Acquire Infrastructurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583

has super-classes
Resource Development Technique c
has sub-classes
Botnet c, DNS Server c, Domains c, Server c, Virtual Private Server c, Web Services c

Actionable Itemc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/ActionableItem

A foundational element for analyst workflows.
has super-classes
Mekanoid Thing c, Record c
has sub-classes
Incident c, Ticket c

Active Certificate Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ActiveCertificateAnalysis

has super-classes
Certificate Analysis c
has members
Active Certificate Analysis ni
is also defined as
named individual

Active Debug Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-489

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
ASP.NET Misconfiguration: Creating Debug Binary c

Active Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ActiveLearning

has super-classes
Machine Learning c
has sub-classes
Density-weighted Method c, Expected Error Reduction c, Expected Model Change c, Query By Committee c, Uncertainty Sampling c, Variance Reduction c
is also defined as
named individual

Active Logical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ActiveLogicalLinkMapping

has super-classes
Logical Link Mapping c
is also defined as
named individual

Active Physical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ActivePhysicalLinkMapping

has super-classes
Physical Link Mapping c
is disjoint with
Passive Physical Link Mapping c
is also defined as
named individual

Active Scanningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1595

has super-classes
Reconnaissance Technique c
has sub-classes
Scanning IP Blocks c, Vulnerability Scanning c, Wordlist Scanning c

Active Setupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.014

has super-classes
Boot or Logon Autostart Execution c

Activityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Activity

has super-classes
D3FEND Thing c
has sub-classes
Organizational Activity c

Activity Dependencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ActivityDependency

has super-classes
Dependency c

Actor-Criticc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Actor-Critic

has super-classes
Policy Gradient c, Temporal Difference Learning c
is also defined as
named individual

Adaptive Resonance Theory Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdaptiveResonanceTheoryClustering

has super-classes
ANN-based Clustering c
is also defined as
named individual

Add Office 365 Global Administrator Rolec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098.003

has super-classes
Account Manipulation c
is also defined as
named individual

Add-insc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.006

has super-classes
Office Application Startup c
is also defined as
named individual

Addition of Data Structure Sentinelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-464

has super-classes
Improper Neutralization of Special Elements c

Additional Azure Service Principal Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098.001

has super-classes
Account Manipulation c
is also defined as
named individual

Address Spacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AddressSpace

Is defined by
https://dbpedia.org/page/Address_space
has super-classes
Digital Artifact c
has sub-classes
Memory Address Space c

Admin Feature Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdminFeatureAssessment

has super-classes
Feature Assessment c

Admin Feature Claimc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdminFeatureClaim

has super-classes
Capability Feature Claim c

Administrative Featurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdministrativeFeature

has super-classes
Capability Feature c

Administrative Network Activity Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdministrativeNetworkActivityAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Administrative Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AdministrativeNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Intranet Administrative Network Traffic c
is also defined as
named individual

Advisoryc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Advisory

Notification of significant new trends or developments regarding the threat to the information systems of an organization. This notification may include analytical insights into trends, intentions, technologies, or tactics of an adversary targeting information systems. Rationale: General definition of a commonly understood term.
Is defined by
https://csrc.nist.gov/glossary/term/advisory
has super-classes
Document c, Mekanoid Thing c
has members
SPV Merkle proof malleability allows the maintainer to prove invalid transactions ni

Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Agent

has super-classes
D3FEND Catalog Thing c
has sub-classes
Organization c, Person c

Agglomerative Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AgglomerativeClustering

has super-classes
Hierarchical Clustering c
is also defined as
named individual

Alethic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AlethicLogic

has super-classes
Modal Logic c
is also defined as
named individual

Aliasc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Alias

Is defined by
http://dbpedia.org/resource/Alias_(Mac_OS)
has super-classes
Slow Symbolic Link c

Allocate Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AllocateMemory

has super-classes
System Call c
is also defined as
named individual

Allocation of File Descriptors or Handles Without Limits or Throttlingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-774

has super-classes
Allocation of Resources Without Limits or Throttling c

Allocation of Resources Without Limits or Throttlingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-770

has super-classes
Improper Initialization c, Uncontrolled Resource Consumption c
has sub-classes
Allocation of File Descriptors or Handles Without Limits or Throttling c, Improperly Controlled Sequential Memory Allocation c, Memory Allocation with Excessive Size Value c

Always-Incorrect Control Flow Implementationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-670

has super-classes
Insufficient Control Flow Management c
has sub-classes
Execution After Redirect (EAR) c, Incorrect Block Delimitation c, Omitted Break Statement in Switch c, Operator Precedence Logic Error c, Reachable Assertion c, Use of Incorrect Operator c

Analysis of Alternativesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AnalysisOfAlternatives

has super-classes
D3FEND Catalog Thing c

Analysis Reportc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Report

A document containing the results of an assessment or analysis of an artifact.
has super-classes
Document c, Mekanoid Thing c, Record c
is in domain of
has URL op

Analytic Latencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AnalyticLatency

has super-classes
Latency c
has members
non-real-time-analytic ni, real-time-analytic ni

Analytic Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AnalyticTechnique

Is defined by
https://dictionary.cambridge.org/us/dictionary/english/analytics
has super-classes
D3FEND Thing c
has sub-classes
Machine Learning c, Statistical Method c, Symbolic Logic c

Analytical Purposec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AnalyticalPurpose

has super-classes
D3FEND Thing c
has sub-classes
Classifying c, Forecasting c, Matching c, Media Generation c, Planning c, Summarizing c

ANN-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ANN-basedClustering

has super-classes
Cluster Analysis c
has sub-classes
Adaptive Resonance Theory Clustering c, DNN-based Clustering c, Self-organizing Map c
is also defined as
named individual

Answer Set Programmingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AnswerSetProgramming

has super-classes
Logic Programming c
is also defined as
named individual

AppCert DLLsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1182

has super-classes
Persistence Technique c, Privilege Escalation Technique c

AppCert DLLsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.009

has super-classes
Event Triggered Execution c
is also defined as
named individual

AppInit DLLsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1103

has super-classes
Persistence Technique c, Privilege Escalation Technique c

AppInit DLLsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.010

has super-classes
Event Triggered Execution c
is also defined as
named individual

AppleScriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1155

has super-classes
Execution Technique c

AppleScript Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.002

has super-classes
Command and Scripting Interpreter Execution c

Appliancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Appliance

has super-classes
Product c

Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Application

has super-classes
Software c
has sub-classes
Client Application c, Password Manager c, Service Application c, User Application c
is also defined as
named individual

Application Access Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1527

has super-classes
Defense Evasion Technique c, Lateral Movement Technique c

Application Access Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1550.001

has super-classes
Use Alternate Authentication Material c
is also defined as
named individual

Application Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationConfiguration

has super-classes
Configuration Resource c
has sub-classes
Application Configuration Database Record c, Application Process Configuration c, Application Rule c, Process Environment Variable c
is also defined as
named individual

Application Configuration Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationConfigurationDatabase

has super-classes
Configuration Database c
has sub-classes
Shim Database c
is also defined as
named individual

Application Configuration Database Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationConfigurationDatabaseRecord

has super-classes
Application Configuration c, Configuration Database Record c
is also defined as
named individual

Application Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationConfigurationFile

has super-classes
Configuration File c
has sub-classes
Compiler Configuration File c
is also defined as
named individual

Application Configuration Hardeningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationConfigurationHardening

has super-classes
Application Hardening c
is also defined as
named individual

Application Deployment Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1017

has super-classes
Lateral Movement Technique c

Application Exhaustion Floodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1499.003

has super-classes
Endpoint Denial of Service c

Application Hardeningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationHardening

has super-classes
Defensive Technique c
has sub-classes
Application Configuration Hardening c, Dead Code Elimination c, Exception Handler Pointer Validation c, Pointer Authentication c, Process Segment Execution Prevention c, Segment Address Offset Randomization c, Stack Frame Canary Validation c
has members
Application Configuration Hardening ni, Dead Code Elimination ni, Exception Handler Pointer Validation ni, Pointer Authentication ni, Process Segment Execution Prevention ni, Segment Address Offset Randomization ni, Stack Frame Canary Validation ni
is also defined as
named individual

Application Installerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationInstaller

has super-classes
User Application c
is also defined as
named individual

Application Inventory Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationInventorySensor

has super-classes
Endpoint Sensor c
is also defined as
named individual

Application Layer Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationLayerFirewall

Is defined by
http://dbpedia.org/resource/Application_firewall
has super-classes
Firewall c
has sub-classes
Web Application Firewall c

Application Layer Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1071

has super-classes
Command and Control Technique c
has sub-classes
DNS c, File Transfer Protocols c, Mail Protocols c, Web Protocols c
is also defined as
named individual

Application or System Exploitationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1499.004

has super-classes
Endpoint Denial of Service c

Application Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationProcess

has super-classes
User Process c
has sub-classes
Container Process c, Script Application Process c, Service Application Process c
is also defined as
named individual

Application Process Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationProcessConfiguration

has super-classes
Application Configuration c

Application Rulec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationRule

has super-classes
Application Configuration c
has sub-classes
Detection Rule c, Email Rule c, Security Policy c

Application Shimc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApplicationShim

has super-classes
Shim c

Application Shimmingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1138

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Application Shimmingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.011

has super-classes
Event Triggered Execution c
is also defined as
named individual

Application User Accountc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/ApplicationUserAccount

has super-classes
User Account c
has sub-classes
Mekanoid User Account c

Application Window Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1010

has super-classes
Discovery Technique c
is also defined as
named individual

Application-Level Admin Tool with Inconsistent View of Underlying Operating Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1249

has super-classes
Improper Preservation of Consistency Between Independent Representations of Shared State c

Approximate String Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ApproximateStringMatching

has super-classes
Partial Matching c
has sub-classes
Levenschtein Matching c
is also defined as
named individual

Architecture with Number of Horizontal Layers Outside of Expected Rangec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1044

has super-classes
Improper Adherence to Coding Standards c

Archive Collected Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1560

has super-classes
Collection Technique c
has sub-classes
Archive via Custom Method c, Archive via Library c, Archive via Utility c
is also defined as
named individual

Archive Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ArchiveFile

has super-classes
File c
has sub-classes
Custom Archive File c, Java Archive c
is also defined as
named individual

Archive via Custom Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1560.003

has super-classes
Archive Collected Data c
is also defined as
named individual

Archive via Libraryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1560.002

has super-classes
Archive Collected Data c
is also defined as
named individual

Archive via Utilityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1560.001

has super-classes
Archive Collected Data c
is also defined as
named individual

ARIMA Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ARIMAModel

has super-classes
Time Series Analysis c
is also defined as
named individual

ARMA Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ARMA_Model

has super-classes
Time Series Analysis c
is also defined as
named individual

ARP Cache Poisoningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1557.002

has super-classes
Man-in-the-Middle c

Array Declared Public, Final, and Staticc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-582

has super-classes
Exposure of Resource to Wrong Sphere c

Articlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Article

has super-classes
Document c
has sub-classes
Academic Article c, News Article c

Artifactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Artifact

has super-classes
D3FEND Thing c
has sub-classes
Digital Artifact c, Physical Artifact c, System c
is in domain of
may-have-weakness op
is in range of
d3fend-tactical-verb-property op, may-be-weakness-of op

Artifact Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ArtifactServer

has super-classes
Web Server c
has sub-classes
Data Artifact Server c, Software Artifact Server c

Artificial Neural Network Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ArtificialNeuralNetClassification

has super-classes
Classification c
has sub-classes
Deep Neural Network Classification c, Multilayer Perceptron Classification c
is also defined as
named individual

AS-REP Roastingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1558.004

has super-classes
Steal or Forge Kerberos Tickets c

ASNc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/ASN

Autonomous System Number
has super-classes
Identifier c, Mekanoid Thing c

ASP.NET Misconfiguration: Creating Debug Binaryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-11

has super-classes
Active Debug Code c

ASP.NET Misconfiguration: Improper Model Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1174

has super-classes
Improper Use of Validation Framework c

ASP.NET Misconfiguration: Missing Custom Error Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-12

has super-classes
Missing Custom Error Page c

ASP.NET Misconfiguration: Not Using Input Validation Frameworkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-554

has super-classes
Improper Use of Validation Framework c

ASP.NET Misconfiguration: Password in Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-13

has super-classes
Password in Configuration File c

ASP.NET Misconfiguration: Use of Identity Impersonationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-556

has super-classes
Incorrect Privilege Assignment c

Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Assessment

Is defined by
http://wordnet-rdf.princeton.edu/id/05741528-n
has super-classes
D3FEND Catalog Thing c
has sub-classes
Capability Assessment c, Feature Assessment c, Portfolio Assessment c

Asset Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AssetInventory

has super-classes
Defensive Technique c
has sub-classes
Asset Vulnerability Enumeration c, Configuration Inventory c, Data Inventory c, Hardware Component Inventory c, Network Node Inventory c, Software Inventory c
has members
Asset Vulnerability Enumeration ni, Configuration Inventory ni, Data Inventory ni, Hardware Component Inventory ni, Network Node Inventory ni, Software Inventory ni
is also defined as
named individual

Asset Vulnerability Enumerationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AssetVulnerabilityEnumeration

has super-classes
Asset Inventory c
has sub-classes
Container Image Analysis c
has members
Container Image Analysis ni
is also defined as
named individual

Assigning instead of Comparingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-481

has super-classes
Use of Incorrect Operator c

Assignment of a Fixed Address to a Pointerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-587

has super-classes
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c, Use of Invariant Value in Dynamically Changing Context c

Assignment to Variable without Usec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-563

has super-classes
Irrelevant Code c

Association Rule Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AssociationRuleLearning

has super-classes
Unsupervised Learning c
is also defined as
named individual

Assumed-Immutable Data is Stored in Writable Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1282

has super-classes
Exposure of Resource to Wrong Sphere c

Asymmetric Cryptographyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1573.002

has super-classes
Encrypted Channel c
is also defined as
named individual

Asymmetric Feature-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AsymmetricFeature-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Asymmetric Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AsymmetricKey

has super-classes
Cryptographic Key c
has sub-classes
Private Key c, Public Key c

Asymmetric Resource Consumption (Amplification)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-405

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Data Resource Access without Use of Connection Pooling c, Excessive Index Range Scan for a Data Resource c, Excessive Platform Resource Consumption within a Loop c, Improper Handling of Highly Compressed Data (Data Amplification) c, Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') c, Incorrect Behavior Order: Early Amplification c, Inefficient Algorithmic Complexity c, Inefficient CPU Computation c, Insufficient Control of Network Message Volume (Network Amplification) c, Invokable Control Element with Excessive File or Data Access Operations c, Large Data Table with Excessive Number of Indices c, Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses c

Asynchronous Procedure Callc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.004

has super-classes
Process Injection c
is also defined as
named individual

At (Linux) Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.001

has super-classes
Scheduled Task/Job Execution c

At (Windows) Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.002

has super-classes
Scheduled Task/Job Execution c

Attack Complexityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-AttackComplexity

This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. As described below, such conditions may require the collection of more information about the target, or computational exceptions. Importantly, the assessment of this metric excludes any requirements for user interaction in order to exploit the vulnerability (such conditions are captured in the User Interaction metric). If a specific configuration is required for an attack to succeed, the Base metrics should be scored assuming the vulnerable component is in that configuration. The Base Score is greatest for the least complex attacks.
is equivalent to
{ High , Low }
has super-classes
CVSS Metric c
is in range of
attack complexity op
has members
High ni, Low ni
is disjoint with
Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

ATTACK Mitigationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ATTACKMitigation

has super-classes
ATTACK Thing c
has members
Account Use Policies ni, Active Directory Configuration ni, Antivirus/Antimalware ni, Application Developer Guidance ni, Application Isolation and Sandboxing ni, Audit ni, Behavior Prevention on Endpoint ni, Boot Integrity ni, Code Signing ni, Credential Access Protection ni, Data Backup ni, Disable or Remove Feature or Program ni, Do Not Mitigate ni, Encrypt Sensitive Information ni, Environment Variable Permissions ni, Execution Prevention ni, Exploit Protection ni, Filter Network Traffic ni, Limit Access to Resource Over Network ni, Limit Hardware Installation ni, Limit Software Installation ni, Multi-factor Authentication ni, Network Intrusion Prevention ni, Network Segmentation ni, Operating System Configuration ni, Password Policies ni, Pre-compromise ni, Privileged Account Management ni, Privileged Process Integrity ni, Remote Data Storage ni, Restrict File and Directory Permissions ni, Restrict Library Loading ni, Restrict Registry Permission ni, Restrict Web-Based Content ni, SSL/TLS Inspection ni, Software Configuration ni, Threat Intelligence Program ni, Update Software ni, User Account Control ni, User Account Management ni, User Training ni, Vulnerability Scanning ni

ATTACK Thingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ATTACKThing

has sub-classes
ATTACK Mitigation c, Offensive Tactic c, Offensive Technique c

Attack Vectorc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-AttackVector

This metric reflects the context by which vulnerability exploitation is possible. This metric value (and consequently the Base Score) will be larger the more remote (logically, and physically) an attacker can be in order to exploit the vulnerable component. The assumption is that the number of potential attackers for a vulnerability that could be exploited from across a network is larger than the number of potential attackers that could exploit a vulnerability requiring physical access to a device, and therefore warrants a greater Base Score.
is equivalent to
{ Adjacent , Local , Network , Physical }
has super-classes
CVSS Metric c
is in range of
attack vector op
has members
Adjacent ni, Local ni, Network ni, Physical ni
is disjoint with
Attack Complexity c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Attempt to Access Child of a Non-structure Pointerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-588

has super-classes
Incorrect Type Conversion or Cast c, Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c

Audio Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1123

has super-classes
Collection Technique c
is also defined as
named individual

Audio Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AudioInputDevice

has super-classes
Input Device c
is also defined as
named individual

Authenticate Userc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticateUser

has super-classes
System Call c
is also defined as
named individual

Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Authentication

has super-classes
User Action c
has sub-classes
Web Authentication c
has members
Authentication ni
is also defined as
named individual

Authentication Bypass by Alternate Namec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-289

has super-classes
Weak Authentication c

Authentication Bypass by Assumed-Immutable Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-302

has super-classes
Reliance on Untrusted Inputs in a Security Decision c, Weak Authentication c

Authentication Bypass by Capture-replayc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-294

has super-classes
Weak Authentication c

Authentication Bypass by Primary Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-305

has super-classes
Weak Authentication c

Authentication Bypass by Spoofingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-290

has super-classes
Weak Authentication c
has sub-classes
Reliance on IP Address for Authentication c, Reliance on Reverse DNS Resolution for a Security-Critical Action c, Using Referer Field for Authentication c

Authentication Bypass Using an Alternate Path or Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-288

has super-classes
Missing Authentication for Critical Function c
has sub-classes
Direct Request ('Forced Browsing') c, Missing Protection Mechanism for Alternate Hardware Interface c

Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Createdc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-593

has super-classes
Operation on Resource in Wrong Phase of Lifetime c, Weak Authentication c

Authentication Cache Invalidationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationCacheInvalidation

has super-classes
Credential Eviction c
is also defined as
named individual

Authentication Event Thresholdingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationEventThresholding

has super-classes
User Behavior Analysis c
is also defined as
named individual

Authentication Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationFunction

has super-classes
Subroutine c
is also defined as
named individual

Authentication Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationLog

has super-classes
Log c
is also defined as
named individual

Authentication Packagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1131

has super-classes
Persistence Technique c

Authentication Packagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.002

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Authentication Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationServer

Is defined by
http://dbpedia.org/resource/Authentication_server
has super-classes
Server c

Authentication Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthenticationService

has super-classes
Service Application Process c
has sub-classes
Local Authentication Service c, Remote Authentication Service c
is also defined as
named individual

Authorizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Authorization

has super-classes
User Action c
has sub-classes
Cloud Service Authorization c
is also defined as
named individual

Authorization Bypass Through User-Controlled Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-639

has super-classes
Incorrect Authorization c
has sub-classes
Authorization Bypass Through User-Controlled SQL Primary Key c

Authorization Bypass Through User-Controlled SQL Primary Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-566

has super-classes
Authorization Bypass Through User-Controlled Key c

Authorization Event Thresholdingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthorizationEventThresholding

has super-classes
User Behavior Analysis c
is also defined as
named individual

Authorization Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthorizationLog

has super-classes
Log c
is also defined as
named individual

Authorization Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AuthorizationService

Is defined by
https://www.sciencedirect.com/referencework/9780122272400/encyclopedia-of-information-systems
has super-classes
Network Service c, Service Application Process c
has sub-classes
Local Authorization Service c, Remote Authorization Service c

Autoencodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Autoencoding

has super-classes
Dimension Reduction c
is also defined as
named individual

Automated Collectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1119

has super-classes
Collection Technique c
is also defined as
named individual

Automated Exfiltrationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1020

has super-classes
Exfiltration Technique c
has sub-classes
Traffic Duplication c
is also defined as
named individual

Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1039

has super-classes
Incorrect Comparison c, Protection Mechanism Failure c

Automated Task Runc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/AutomatedTaskRun

has super-classes
Machine Action c, Task Run c

Autoregressive Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AutoregressiveModel

has super-classes
Time Series Analysis c
is also defined as
named individual

Availability Impactc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-AvailabilityImpact

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the impacted component, this metric refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component. The Base Score is greatest when the consequence to the impacted component is highest.
is equivalent to
{ High , Low , None }
has super-classes
CVSS Metric c
is in range of
availability impact op
has members
High ni, Low ni, None ni
is disjoint with
Attack Complexity c, Attack Vector c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Average Absolute Deviationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#AverageAbsoluteDeviation

has super-classes
Variability c
has sub-classes
Mean Absolute Deviation c, Median Absolute Deviation c
is also defined as
named individual

Barcode Scanner Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BarcodeScannerInputDevice

Is defined by
http://dbpedia.org/resource/Barcode_reader
has super-classes
Image Scanner Input Device c

Bash Historyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1139

has super-classes
Credential Access Technique c

Bash Historyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.003

has super-classes
Unsecured Credentials c
is also defined as
named individual

Bayes Optimal Classifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesOptimalClassifier

has super-classes
Ensemble Learning c
is also defined as
named individual

Bayesian Estimationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianEstimation

has super-classes
Bayesian Method c
is also defined as
named individual

Bayesian Hypothesis Testingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianHypothesisTesting

has super-classes
Bayesian Method c
is also defined as
named individual

Bayesian Linear Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianLinearRegression

has super-classes
Regression Analysis c
is also defined as
named individual

Bayesian Linear Regression Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianLinearRegressionLearning

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Bayesian Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianMethod

has super-classes
Statistical Method c
has sub-classes
Bayesian Estimation c, Bayesian Hypothesis Testing c
is also defined as
named individual

Bayesian Model Averagingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianModelAveraging

has super-classes
Ensemble Learning c
is also defined as
named individual

Bayesian Model Combinationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BayesianModelCombination

has super-classes
Ensemble Learning c
is also defined as
named individual

Behavioral Change in New Version or Environmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-439

has super-classes
Improper Interaction Between Multiple Correctly-Behaving Entities c

BERTc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BERT

has super-classes
Transformer-based Learning c
is also defined as
named individual

Bidirectional Communicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1102.002

has super-classes
Web Service c

Binary Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BinaryClassification

has super-classes
Classifying c

Binary Large Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BinaryLargeObject

Is defined by
http://dbpedia.org/resource/Binary_large_object
has super-classes
Digital Artifact c
has sub-classes
JavaScript Blob c

Binary Paddingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1009

has super-classes
Defense Evasion Technique c

Binary Paddingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.001

has super-classes
Obfuscated Files or Information c
is also defined as
named individual

Binary Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BinarySegment

has super-classes
Digital Artifact c
has sub-classes
Image Segment c, Process Segment c

Binding to an Unrestricted IP Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1327

has super-classes
Exposure of Resource to Wrong Sphere c

Biometric Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BiometricAuthentication

has super-classes
Credential Hardening c
is also defined as
named individual

BITS Jobsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1197

has super-classes
Defense Evasion Technique c, Persistence Technique c
is also defined as
named individual

Blobc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Blob

Is defined by
http://dbpedia.org/resource/Binary_large_object
has super-classes
Digital Artifact c

Block Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BlockDevice

has super-classes
Digital Artifact c
is also defined as
named individual

Book Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BookReference

has super-classes
Technique Reference c
has members
Reference - Organizational Management in SAP ERP HCM ni

Boolean Expression Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BooleanExpressionMatching

has super-classes
Logical Rules c
is also defined as
named individual

Boostingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Boosting

has super-classes
Ensemble Learning c
is also defined as
named individual

Boot Loaderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BootLoader

has super-classes
Digital Artifact c
has sub-classes
First-stage Boot Loader c, Second-stage Boot Loader c
is also defined as
named individual

Boot or Logon Autostart Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547

has super-classes
Persistence Technique c, Privilege Escalation Technique c
has sub-classes
Active Setup c, Authentication Package c, Kernel Modules and Extensions c, LSASS Driver c, Login Items c, Plist Modification c, Port Monitors c, Print Processors c, Re-opened Applications c, Registry Run Keys / Startup Folder c, Security Support Provider c, Shortcut Modification c, Time Providers c, Winlogon Helper DLL c, XDG Autostart Entries c

Boot or Logon Initialization Scriptsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037

has super-classes
Persistence Technique c, Privilege Escalation Technique c
has sub-classes
Logon Script (Mac) c, Logon Script (Windows) c, Network Logon Script c, Rc.common c, Startup Items c

Boot Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BootRecord

has super-classes
Record c
has sub-classes
Boot Sector c, Volume Boot Record c

Boot Sectorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BootSector

has super-classes
Boot Record c
is also defined as
named individual

Bootkitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1067

has super-classes
Persistence Technique c

Bootkitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542.003

has super-classes
Pre-OS Boot c
is also defined as
named individual

Bootloader Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BootloaderAuthentication

has super-classes
Platform Hardening c
is also defined as
named individual

Bootstrap Aggregatingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BootstrapAggregating

has super-classes
Resampling Ensemble c
has sub-classes
Random Forest c
is also defined as
named individual

Botnetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.005

has super-classes
Acquire Infrastructure c

Botnetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.005

has super-classes
Compromise Infrastructure c

Broadcast Domain Isolationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BroadcastDomainIsolation

has super-classes
Network Isolation c
is also defined as
named individual

Browserc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Browser

has super-classes
User Application c
has members
chrome ni
is also defined as
named individual

Browser Bookmark Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1217

has super-classes
Discovery Technique c

Browser Extensionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BrowserExtension

has super-classes
User Application c
is also defined as
named individual

Browser Extensionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1176

has super-classes
Persistence Technique c
is also defined as
named individual

Brute Forcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1110

has super-classes
Credential Access Technique c
has sub-classes
Credential Stuffing c, Password Cracking c, Password Guessing c, Password Spraying c

Bucket of Modelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BucketOfModels

has super-classes
Ensemble Learning c
is also defined as
named individual

Buffer Access Using Size of Source Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-806

has super-classes
Buffer Access with Incorrect Length Value c

Buffer Access with Incorrect Length Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-805

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Buffer Access Using Size of Source Buffer c

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-120

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Use of Path Manipulation Function without Maximum-sized Buffer c

Buffer Over-readc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-126

has super-classes
Access of Memory Location After End of Buffer c, Out-of-bounds Read c

Buffer Under-readc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-127

has super-classes
Access of Memory Location Before Start of Buffer c, Out-of-bounds Read c

Buffer Underwrite ('Buffer Underflow')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-124

has super-classes
Access of Memory Location Before Start of Buffer c, Out-of-bounds Write c

Build Image on Hostc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1612

has super-classes
Defense Evasion Technique c

Build Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BuildTool

has super-classes
Developer Application c
has sub-classes
Compiler c, Software Packaging Tool c

Business Communication Platform Clientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#BusinessCommunicationPlatformClient

Is defined by
http://dbpedia.org/resource/Business_communication
has super-classes
Collaborative Software c

Business Relationshipsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1591.002

has super-classes
Gather Victim Org Information c

Bypass User Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1548.002

has super-classes
Abuse Elevation Control Mechanism c
is also defined as
named individual

Bypass User Account Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1088

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c

Byte Sequence Emulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ByteSequenceEmulation

has super-classes
Network Traffic Analysis c
is also defined as
named individual

C4.5c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#C4.5

has super-classes
Decision Tree c
is also defined as
named individual

C5.0c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#C5.0

has super-classes
Decision Tree c
is also defined as
named individual

CA Certificate Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CACertificateFile

has super-classes
Certificate File c

Cached Domain Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.005

has super-classes
OS Credential Dumping c
is also defined as
named individual

Call Stackc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CallStack

has super-classes
Digital Artifact c
is also defined as
named individual

Call to Non-ubiquitous APIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-589

has super-classes
Use of Function with Inconsistent Implementations c

Call to Thread run() instead of start()c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-572

has super-classes
Incorrect Synchronization c

Callable with Insufficient Behavioral Summaryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1117

has super-classes
Inappropriate Source Code Style or Formatting c

Canopy Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CanopyClustering

has super-classes
Cluster Analysis c
is also defined as
named individual

Capabilityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Capability

Is defined by
http://dbpedia.org/resource/Capability_(systems_engineering)
has super-classes
D3FEND Thing c

Capability Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CapabilityAssessment

has super-classes
Assessment c

Capability Featurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CapabilityFeature

has super-classes
D3FEND Catalog Thing c
has sub-classes
Administrative Feature c, Defensive Technique c
is in range of
features op

Capability Feature Claimc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CapabilityFeatureClaim

has super-classes
Statement c
has sub-classes
Admin Feature Claim c, Defensive Technique Claim c
is in domain of
comments dp, features op

Capability Implementationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CapabilityImplementation

has super-classes
D3FEND Catalog Thing c
has sub-classes
Product c, Service c
is in domain of
implements op, operating-system dp
is in range of
implemented-by op

CAPEC Thingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CAPECThing

has sub-classes
Common Attack Pattern c

CARTc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CART

has super-classes
Decision Tree c
has sub-classes
Gradient-Boosted Decision Tree c
is also defined as
named individual

Catalogc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Catalog

Is defined by
http://wordnet-rdf.princeton.edu/id/06499734-n
has super-classes
Information Content Entity c
has sub-classes
Control Catalog c

CCI Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CCIControl

has super-classes
External Control c
has members
CCI-000015 ni, CCI-000016 ni, CCI-000017 ni, CCI-000018 ni, CCI-000020 ni, CCI-000022 ni, CCI-000025 ni, CCI-000027 ni, CCI-000029 ni, CCI-000030 ni, CCI-000032 ni, CCI-000034 ni, CCI-000035 ni, CCI-000037 ni, CCI-000040 ni, CCI-000044 ni, CCI-000047 ni, CCI-000056 ni, CCI-000057 ni, CCI-000058 ni, CCI-000060 ni, CCI-000066 ni, CCI-000067 ni, CCI-000068 ni, CCI-000071 ni, CCI-000139 ni, CCI-000143 ni, CCI-000144 ni, CCI-000162 ni, CCI-000163 ni, CCI-000164 ni, CCI-000185 ni, CCI-000186 ni, CCI-000187 ni, CCI-000192 ni, CCI-000193 ni, CCI-000194 ni, CCI-000195 ni, CCI-000196 ni, CCI-000197 ni, CCI-000198 ni, CCI-000199 ni, CCI-000200 ni, CCI-000205 ni, CCI-000213 ni, CCI-000218 ni, CCI-000219 ni, CCI-000226 ni, CCI-000346 ni, CCI-000352 ni, CCI-000374 ni, CCI-000381 ni, CCI-000382 ni, CCI-000386 ni, CCI-000417 ni, CCI-000663 ni, CCI-000764 ni, CCI-000765 ni, CCI-000766 ni, CCI-000767 ni, CCI-000768 ni, CCI-000771 ni, CCI-000772 ni, CCI-000774 ni, CCI-000776 ni, CCI-000804 ni, CCI-000831 ni, CCI-000877 ni, CCI-000880 ni, CCI-000884 ni, CCI-000888 ni, CCI-001009 ni, CCI-001019 ni, CCI-001067 ni, CCI-001069 ni, CCI-001082 ni, CCI-001083 ni, CCI-001084 ni, CCI-001085 ni, CCI-001086 ni, CCI-001087 ni, CCI-001089 ni, CCI-001090 ni, CCI-001092 ni, CCI-001094 ni, CCI-001096 ni, CCI-001100 ni, CCI-001109 ni, CCI-001111 ni, CCI-001115 ni, CCI-001117 ni, CCI-001118 ni, CCI-001124 ni, CCI-001125 ni, CCI-001127 ni, CCI-001128 ni, CCI-001133 ni, CCI-001144 ni, CCI-001145 ni, CCI-001146 ni, CCI-001147 ni, CCI-001150 ni, CCI-001166 ni, CCI-001169 ni, CCI-001170 ni, CCI-001178 ni, CCI-001185 ni, CCI-001199 ni, CCI-001200 ni, CCI-001210 ni, CCI-001211 ni, CCI-001233 ni, CCI-001237 ni, CCI-001239 ni, CCI-001242 ni, CCI-001262 ni, CCI-001297 ni, CCI-001305 ni, CCI-001310 ni, CCI-001350 ni, CCI-001352 ni, CCI-001356 ni, CCI-001368 ni, CCI-001372 ni, CCI-001373 ni, CCI-001374 ni, CCI-001376 ni, CCI-001377 ni, CCI-001399 ni, CCI-001400 ni, CCI-001401 ni, CCI-001403 ni, CCI-001404 ni, CCI-001405 ni, CCI-001414 ni, CCI-001424 ni, CCI-001425 ni, CCI-001426 ni, CCI-001427 ni, CCI-001428 ni, CCI-001436 ni, CCI-001452 ni, CCI-001453 ni, CCI-001454 ni, CCI-001493 ni, CCI-001494 ni, CCI-001495 ni, CCI-001496 ni, CCI-001499 ni, CCI-001555 ni, CCI-001556 ni, CCI-001557 ni, CCI-001574 ni, CCI-001589 ni, CCI-001619 ni, CCI-001632 ni, CCI-001662 ni, CCI-001668 ni, CCI-001677 ni, CCI-001682 ni, CCI-001683 ni, CCI-001684 ni, CCI-001685 ni, CCI-001686 ni, CCI-001695 ni, CCI-001744 ni, CCI-001749 ni, CCI-001762 ni, CCI-001764 ni, CCI-001767 ni, CCI-001774 ni, CCI-001811 ni, CCI-001812 ni, CCI-001813 ni, CCI-001855 ni, CCI-001858 ni, CCI-001936 ni, CCI-001937 ni, CCI-001941 ni, CCI-001953 ni, CCI-001954 ni, CCI-001957 ni, CCI-001991 ni, CCI-002005 ni, CCI-002009 ni, CCI-002010 ni, CCI-002015 ni, CCI-002016 ni, CCI-002041 ni, CCI-002145 ni, CCI-002165 ni, CCI-002169 ni, CCI-002178 ni, CCI-002179 ni, CCI-002201 ni, CCI-002205 ni, CCI-002207 ni, CCI-002211 ni, CCI-002218 ni, CCI-002233 ni, CCI-002235 ni, CCI-002238 ni, CCI-002262 ni, CCI-002263 ni, CCI-002264 ni, CCI-002272 ni, CCI-002277 ni, CCI-002281 ni, CCI-002282 ni, CCI-002283 ni, CCI-002284 ni, CCI-002289 ni, CCI-002290 ni, CCI-002302 ni, CCI-002306 ni, CCI-002307 ni, CCI-002308 ni, CCI-002309 ni, CCI-002322 ni, CCI-002346 ni, CCI-002347 ni, CCI-002353 ni, CCI-002355 ni, CCI-002357 ni, CCI-002358 ni, CCI-002359 ni, CCI-002361 ni, CCI-002363 ni, CCI-002364 ni, CCI-002381 ni, CCI-002382 ni, CCI-002384 ni, CCI-002385 ni, CCI-002394 ni, CCI-002397 ni, CCI-002400 ni, CCI-002403 ni, CCI-002409 ni, CCI-002411 ni, CCI-002420 ni, CCI-002421 ni, CCI-002422 ni, CCI-002423 ni, CCI-002425 ni, CCI-002426 ni, CCI-002460 ni, CCI-002462 ni, CCI-002463 ni, CCI-002464 ni, CCI-002465 ni, CCI-002466 ni, CCI-002467 ni, CCI-002468 ni, CCI-002470 ni, CCI-002475 ni, CCI-002476 ni, CCI-002530 ni, CCI-002531 ni, CCI-002533 ni, CCI-002536 ni, CCI-002546 ni, CCI-002605 ni, CCI-002607 ni, CCI-002613 ni, CCI-002614 ni, CCI-002617 ni, CCI-002618 ni, CCI-002630 ni, CCI-002631 ni, CCI-002661 ni, CCI-002662 ni, CCI-002684 ni, CCI-002688 ni, CCI-002689 ni, CCI-002690 ni, CCI-002691 ni, CCI-002710 ni, CCI-002711 ni, CCI-002712 ni, CCI-002715 ni, CCI-002716 ni, CCI-002717 ni, CCI-002718 ni, CCI-002723 ni, CCI-002724 ni, CCI-002726 ni, CCI-002729 ni, CCI-002740 ni, CCI-002743 ni, CCI-002746 ni, CCI-002748 ni, CCI-002749 ni, CCI-002771 ni, CCI-002824 ni, CCI-002883 ni, CCI-002890 ni, CCI-002891 ni, CCI-003014 ni, CCI-003123 ni

CDNsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596.004

has super-classes
Search Open Technical Databases c

Central Processing Unitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CentralProcessingUnit

has super-classes
Processor c
is also defined as
named individual

Central Tendencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CentralTendency

has super-classes
Descriptive Statistics c
has sub-classes
Geometric Mean c, Harmonic Mean c, Mean c, Median c, Mode c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Centroid-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Centroid-basedClustering

has super-classes
Cluster Analysis c
has sub-classes
K-means Clustering c
is also defined as
named individual

Certificatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Certificate

has super-classes
Digital Artifact c
is also defined as
named individual

Certificate Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CertificateAnalysis

has super-classes
Network Traffic Analysis c
has sub-classes
Active Certificate Analysis c, Passive Certificate Analysis c
has members
Active Certificate Analysis ni, Certificate Analysis ni, Passive Certificate Analysis ni
is also defined as
named individual

Certificate Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CertificateFile

has super-classes
File c
has sub-classes
CA Certificate File c
is also defined as
named individual

Certificate Pinningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CertificatePinning

has super-classes
Credential Hardening c
is also defined as
named individual

Certificate Trust Storec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CertificateTrustStore

has super-classes
Trust Store c
is also defined as
named individual

Certificate-based Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Certificate-basedAuthentication

has super-classes
Credential Hardening c
is also defined as
named individual

Change Default File Associationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1042

has super-classes
Persistence Technique c

Change Default File Associationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.001

has super-classes
Event Triggered Execution c
is also defined as
named individual

Channel Accessible by Non-Endpointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-300

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c

Chatroom Clientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ChatroomClient

Is defined by
http://dbpedia.org/resource/Chat_room
has super-classes
Collaborative Software c

Child Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ChildProcess

Is defined by
http://dbpedia.org/resource/Child_process
has super-classes
Process c

Class Instance Self Destruction Control Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1082

has super-classes
Insufficient Adherence to Expected Conventions c

Class with Excessive Number of Child Classesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1086

has super-classes
Excessively Complex Data Representation c

Class with Excessively Deep Inheritancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1074

has super-classes
Excessively Complex Data Representation c

Class with Virtual Method without a Virtual Destructorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1087

has super-classes
Insufficient Adherence to Expected Conventions c

Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Classification

has super-classes
Supervised Learning c
has sub-classes
Artificial Neural Network Classification c, Decision Tree c, K-Nearest Neighbors c, Linear Classifier c, Naive Bayes Classifier c, Support Vector Machine Classification c
is also defined as
named individual

Classifyingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Classifying

has super-classes
Analytical Purpose c
has sub-classes
Binary Classification c, Multiclass Classification c
is disjoint with
Forecasting c, Media Generation c, Matching c, Summarizing c

Clear Command Historyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.003

has super-classes
Indicator Removal on Host c
is also defined as
named individual

Clear Command Historyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1146

has super-classes
Defense Evasion Technique c

Clear Linux or Mac System Logsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.002

has super-classes
Indicator Removal on Host c
is also defined as
named individual

Clear Windows Event Logsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.001

has super-classes
Indicator Removal on Host c
is also defined as
named individual

Cleartext Storage in a File or on Diskc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-313

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage in the Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-314

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage of Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-312

has super-classes
Insecure Storage of Sensitive Information c, Missing Encryption of Sensitive Data c
has sub-classes
Cleartext Storage in a File or on Disk c, Cleartext Storage in the Registry c, Cleartext Storage of Sensitive Information in Executable c, Cleartext Storage of Sensitive Information in GUI c, Cleartext Storage of Sensitive Information in Memory c, Cleartext Storage of Sensitive Information in a Cookie c, Cleartext Storage of Sensitive Information in an Environment Variable c

Cleartext Storage of Sensitive Information in a Cookiec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-315

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage of Sensitive Information in an Environment Variablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-526

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage of Sensitive Information in Executablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-318

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage of Sensitive Information in GUIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-317

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Storage of Sensitive Information in Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-316

has super-classes
Cleartext Storage of Sensitive Information c

Cleartext Transmission of Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-319

has super-classes
Missing Encryption of Sensitive Data c
has sub-classes
J2EE Misconfiguration: Data Transmission Without Encryption c, Sensitive Cookie in HTTPS Session Without 'Secure' Attribute c

Client Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ClientApplication

has super-classes
Application c
is also defined as
named individual

Client Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ClientComputer

Is defined by
http://dbpedia.org/resource/Client_(computing)
has super-classes
Host c
has sub-classes
Embedded Computer c, Personal Computer c, Shared Computer c

Client Configurationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1592.004

has super-classes
Gather Victim Host Information c

Client-server Payload Profilingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Client-serverPayloadProfiling

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Client-Side Enforcement of Server-Side Securityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-602

has super-classes
Protection Mechanism Failure c
has sub-classes
Reliance on Cookies without Validation and Integrity Checking c, Use of Client-Side Authentication c

Clipboardc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Clipboard

has super-classes
Digital Artifact c
is also defined as
named individual

Clipboard Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1115

has super-classes
Collection Technique c
is also defined as
named individual

clone() Method Without super.clone()c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-580

has super-classes
Improper Control of a Resource Through its Lifetime c, Improper Following of Specification by Caller c

Cloneable Class Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-498

has super-classes
Exposure of Resource to Wrong Sphere c

Cloud Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1087.004

has super-classes
Create Account c
is also defined as
named individual

Cloud Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1136.003

has super-classes
Create Account c

Cloud Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1078.004

has super-classes
Valid Accounts c
is also defined as
named individual

Cloud Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudConfiguration

has super-classes
Configuration Resource c
has sub-classes
Cloud Instance Metadata c
is also defined as
named individual

Cloud Groupsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1069.003

has super-classes
Permission Groups Discovery c

Cloud Infrastructure Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1580

has super-classes
Discovery Technique c

Cloud Instance Metadatac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudInstanceMetadata

has super-classes
Cloud Configuration c
is also defined as
named individual

Cloud Instance Metadata APIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.005

has super-classes
Unsecured Credentials c
is also defined as
named individual

Cloud Instance Metadata APIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1522

has super-classes
Credential Access Technique c

Cloud Service Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudServiceAuthentication

has super-classes
Web Authentication c
is also defined as
named individual

Cloud Service Authorizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudServiceAuthorization

has super-classes
Authorization c
is also defined as
named individual

Cloud Service Dashboardc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1538

has super-classes
Discovery Technique c
is also defined as
named individual

Cloud Service Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1526

has super-classes
Discovery Technique c
is also defined as
named individual

Cloud Service Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudServiceSensor

has super-classes
Sensor c
is also defined as
named individual

Cloud Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudStorage

has super-classes
Secondary Storage c
is also defined as
named individual

Cloud Storage Object Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1619

has super-classes
Discovery Technique c
is also defined as
named individual

Cloud User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CloudUserAccount

has super-classes
User Account c
is also defined as
named individual

Cluster Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ClusterAnalysis

has super-classes
Unsupervised Learning c
has sub-classes
ANN-based Clustering c, Canopy Clustering c, Centroid-based Clustering c, Density-based Clustering c, Distribution-based Clustering c, Graph-based Clustering c, Hierarchical Clustering c, High-dimension Clustering c
is also defined as
named individual

Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Clustering

has super-classes
Summarizing c
is disjoint with
Grouping c, Histogramming c

CMSTPc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1191

has super-classes
Defense Evasion Technique c, Execution Technique c

CMSTPc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.003

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Code Analyzerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CodeAnalyzer

has super-classes
Developer Application c
has sub-classes
Dynamic Analysis Tool c, Static Analysis Tool c

Code Repositoriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1213.003

has super-classes
Data from Information Repositories c
is also defined as
named individual

Code Repositoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CodeRepository

has super-classes
Database c
is also defined as
named individual

Code Signingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1116

has super-classes
Defense Evasion Technique c

Code Signingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.002

has super-classes
Subvert Trust Controls c
is also defined as
named individual

Code Signing Certificatesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1587.002

has super-classes
Develop Capabilities c

Code Signing Certificatesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.003

has super-classes
Obtain Capabilities c

Code Signing Policy Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.006

has super-classes
Subvert Trust Controls c

Coefficient of Variationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CoefficientOfVariation

has super-classes
Variability c
is disjoint with
Interquartile Range c, Mean Absolute Deviation c, Median Absolute Deviation c, Range c, Standard Deviation c, Variance c
is also defined as
named individual

Collaborative Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CollaborativeSoftware

Is defined by
http://dbpedia.org/resource/Collaborative_software
has super-classes
User Application c
has sub-classes
Business Communication Platform Client c, Chatroom Client c, Instant Messaging Client c

Collapse of Data into Unsafe Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-182

has super-classes
Protection Mechanism Failure c

Collectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Collection

has super-classes
Offensive Tactic c
is also defined as
named individual

Collection Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CollectionTechnique

has super-classes
Offensive Technique c
has sub-classes
Archive Collected Data c, Audio Capture c, Automated Collection c, Clipboard Data c, Data Staged c, Data from Cloud Storage Object c, Data from Configuration Repository c, Data from Information Repositories c, Data from Local System c, Data from Network Shared Drive c, Data from Removable Media c, Email Collection c, Input Capture c, Man in the Browser c, Man-in-the-Middle c, Screen Capture c, Video Capture c
is also defined as
named individual

Commandc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Command

has super-classes
Digital Artifact c, Digital Event c
has sub-classes
Database Query c, Remote Command c
is also defined as
named individual

Command And Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommandAndControl

has super-classes
Offensive Tactic c
is also defined as
named individual

Command and Control Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommandAndControlTechnique

has super-classes
Offensive Technique c
has sub-classes
Application Layer Protocol c, Communication Through Removable Media c, Custom Command and Control Protocol c, Custom Cryptographic Protocol c, Data Encoding c, Data Obfuscation c, Domain Fronting c, Domain Generation Algorithms c, Dynamic Resolution c, Encrypted Channel c, Fallback Channels c, Ingress Tool Transfer c, Multi-Stage Channels c, Multi-hop Proxy c, Multilayer Encryption c, Non-Application Layer Protocol c, Non-Standard Port c, Protocol Tunneling c, Proxy c, Remote Access Software c, Standard Cryptographic Protocol c, Traffic Signaling c, Uncommonly Used Port c, Web Service c
is also defined as
named individual

Command and Scripting Interpreter Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059

has super-classes
Execution Technique c
has sub-classes
AppleScript Execution c, JavaScript/JScript c, Network Device CLI c, PowerShell Execution c, Python Execution c, Unix Shell Execution c, VBScript Execution c, Windows Command Shell Execution c
is also defined as
named individual

Command History Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommandHistoryLog

has super-classes
Event Log c
is also defined as
named individual

Command History Log Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommandHistoryLogFile

has super-classes
Log File c
is also defined as
named individual

Command Line Interfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommandLineInterface

Is defined by
http://dbpedia.org/resource/Command-line_interface
has super-classes
User Interface c

Command Shell in Externally Accessible Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-553

has super-classes
Files or Directories Accessible to External Parties c

Common Attack Patternc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CommonAttackPattern

has super-classes
CAPEC Thing c
has sub-classes
Exploitation of Transient Instruction Execution c
has members
Exploitation of Transient Instruction Execution ni

communication protocolc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CommunicationProtocol

Is defined by
https://en.wikipedia.org/wiki/Communication_protocol
is equivalent to
{ ICMP , TCP , UDP }
has super-classes
Mekanoid Thing c
has members
ICMP ni, TCP ni, UDP ni

Communication Through Removable Mediac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1092

has super-classes
Command and Control Technique c
is also defined as
named individual

Comparing instead of Assigningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-482

has super-classes
Use of Incorrect Operator c

Comparison Logic is Vulnerable to Power Side-Channel Attacksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1255

has super-classes
Improper Protection of Physical Side Channels c

Comparison of Classes by Namec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-486

has super-classes
Comparison Using Wrong Factors c

Comparison of Incompatible Typesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1024

has super-classes
Incorrect Comparison c

Comparison of Object References Instead of Object Contentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-595

has super-classes
Comparison Using Wrong Factors c
has sub-classes
Use of Wrong Operator in String Comparison c

Comparison Using Wrong Factorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1025

has super-classes
Incorrect Comparison c
has sub-classes
Comparison of Classes by Name c, Comparison of Object References Instead of Object Contents c

Compilation with Insufficient Warnings or Errorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1127

has super-classes
Improper Adherence to Coding Standards c

Compile After Deliveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.004

has super-classes
Obfuscated Files or Information c
is also defined as
named individual

Compile After Deliveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1500

has super-classes
Defense Evasion Technique c

Compiled HTML Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.001

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Compiled HTML Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1223

has super-classes
Defense Evasion Technique c, Execution Technique c

Compilerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Compiler

has super-classes
Build Tool c
is also defined as
named individual

Compiler Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CompilerConfigurationFile

has super-classes
Application Configuration File c
is also defined as
named individual

Compiler Optimization Removal or Modification of Security-critical Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-733

has super-classes
Insecure Automated Optimizations c
has sub-classes
Compiler Removal of Code to Clear Buffers c

Compiler Removal of Code to Clear Buffersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-14

has super-classes
Compiler Optimization Removal or Modification of Security-critical Code c

Component Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1109

has super-classes
Defense Evasion Technique c, Persistence Technique c

Component Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542.002

has super-classes
Pre-OS Boot c
is also defined as
named individual

Component Object Model Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1559.001

has super-classes
Inter-Process Communication Execution c

Component Object Model Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1122

has super-classes
Defense Evasion Technique c, Persistence Technique c

Component Object Model Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.015

has super-classes
Event Triggered Execution c
is also defined as
named individual

Composite Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CompositeTechnique

has super-classes
D3FEND Thing c

Compromise Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1586

has super-classes
Resource Development Technique c
has sub-classes
Email Accounts c, Social Media Accounts c

Compromise Client Software Binaryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1554

has super-classes
Persistence Technique c
is also defined as
named individual

Compromise Hardware Supply Chainc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1195.003

has super-classes
Supply Chain Compromise c
is also defined as
named individual

Compromise Infrastructurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584

has super-classes
Resource Development Technique c
has sub-classes
Botnet c, DNS Server c, Domains c, Server c, Virtual Private Server c, Web Services c

Compromise Software Dependencies and Development Toolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1195.001

has super-classes
Supply Chain Compromise c
is also defined as
named individual

Compromise Software Supply Chainc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1195.002

has super-classes
Supply Chain Compromise c
is also defined as
named individual

Computing Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ComputingServer

Is defined by
https://www.encyclopedia.com/computing/dictionaries-thesauruses-pictures-and-press-releases/compute-server
has super-classes
Server c

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-362

has super-classes
Insufficient Control Flow Management c
has sub-classes
Context Switching Race Condition c, Hardware Logic Contains Race Conditions c, Permission Race Condition During Resource Copy c, Race Condition During Access to Alternate Channel c, Race Condition for Write-Once Attributes c, Race Condition within a Thread c, Signal Handler Race Condition c, Time-of-check Time-of-use (TOCTOU) Race Condition c
is also defined as
named individual

Conference Paperc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConferencePaper

has super-classes
Academic Article c

Confidentiality Impactc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-ConfidentialityImpact

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones. The Base Score is greatest when the loss to the impacted component is highest.
is equivalent to
{ High , Low , None }
has super-classes
CVSS Metric c
has members
High ni, Low ni, None ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Configuration Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationDatabase

has super-classes
Configuration Resource c
has sub-classes
Application Configuration Database c, Configuration Management Database c
is also defined as
named individual

Configuration Database Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationDatabaseRecord

has super-classes
Configuration Resource c, Record c
has sub-classes
Application Configuration Database Record c, System Configuration Database Record c
is also defined as
named individual

Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationFile

Is defined by
http://dbpedia.org/resource/Configuration_file
has super-classes
File c
has sub-classes
Application Configuration File c, Operating System Configuration File c, Property List File c, User Init Configuration File c

Configuration Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationInventory

has super-classes
Asset Inventory c
is also defined as
named individual

Configuration Management Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationManagementDatabase

Is defined by
https://web.archive.org/web/20111201040529/http://www.best-management-practice.com/gempdf/itil_glossary_v3_1_24.pdf
has super-classes
Configuration Database c

Configuration Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConfigurationResource

has super-classes
Resource c
has sub-classes
Access Control Configuration c, Application Configuration c, Cloud Configuration c, Configuration Database c, Configuration Database Record c, Operating System Configuration c
is also defined as
named individual

Confluencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1213.001

has super-classes
Data from Information Repositories c
is also defined as
named individual

Connect Socketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConnectSocket

has super-classes
System Call c
is also defined as
named individual

Connected Honeynetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConnectedHoneynet

has super-classes
Decoy Environment c
is also defined as
named individual

connectionc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Connection

has super-classes
Mekanoid Object c

Connection Attempt Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConnectionAttemptAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Console Output Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConsoleOutputFunction

has super-classes
Subroutine c

Container Administration Commandc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1609

has super-classes
Execution Technique c

Container and Resource Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1613

has super-classes
Discovery Technique c

Container APIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.007

has super-classes
Unsecured Credentials c

Container Build Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerBuildTool

has super-classes
Software Packaging Tool c

Container Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerImage

has super-classes
File c, Software Package c
is also defined as
named individual

Container Image Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerImageAnalysis

has super-classes
Asset Vulnerability Enumeration c
is also defined as
named individual

Container Orchestration Jobc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.007

has super-classes
Scheduled Task/Job Execution c

Container Orchestration Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerOrchestrationSoftware

has super-classes
Service Application c
is also defined as
named individual

Container Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerProcess

has super-classes
Application Process c

Container Runtimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ContainerRuntime

has super-classes
Service Application c
is also defined as
named individual

Context Switching Race Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-368

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c

contributionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Contribution

has super-classes
D3FEND Thing c

controlc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Control

has super-classes
Mekanoid Thing c
has sub-classes
Security Policy c

Control Catalogc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ControlCatalog

has super-classes
Catalog c
has sub-classes
Control Correlation Identifier Catalog c, NIST SP 800-53 Control Catalog c

Control Correlation Identifier Catalogc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ControlCorrelationIdentifierCatalog

has super-classes
Control Catalog c
has members
CCI Catalog v2022-04-05 ni

Control Panel Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.002

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Control Panel Itemsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1196

has super-classes
Defense Evasion Technique c, Execution Technique c

Convolutional Neural Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ConvolutionalNeuralNetwork

has super-classes
Deep Neural Network Classification c
has sub-classes
Grid-CNN c, Residual Neural Network c
is also defined as
named individual

Copy Memory Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CopyMemoryFunction

has super-classes
Subroutine c
is also defined as
named individual

Copy Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CopyToken

has super-classes
System Call c
has members
Copy Token ni
is also defined as
named individual

COR_PROFILERc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.012

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Correlationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Correlation

has super-classes
Descriptive Statistics c
has sub-classes
Cramer's V c, Pearson's Correlation Coefficient c, Phi Coefficient c, Point-biserial Correlation Coefficient c, Rank Correlation c
is also defined as
named individual

Correlation Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CorrelationClustering

has super-classes
High-dimension Clustering c
has sub-classes
Subspace Clustering c
is also defined as
named individual

Covert Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-514

has super-classes
Creation of Emergent Resource c
has sub-classes
Covert Storage Channel c, Covert Timing Channel c

Covert Storage Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-515

has super-classes
Covert Channel c

Covert Timing Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-385

has super-classes
Covert Channel c

CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1252

has super-classes
Improper Access Control c

Cramer's Vc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CramersV

has super-classes
Correlation c
is also defined as
named individual

Create Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1136

has super-classes
Persistence Technique c, Privilege Escalation Technique c
has sub-classes
Cloud Account c, Cloud Account c, Domain Account c, Domain Account c, Local Account c, Local Account c
is also defined as
named individual

Create Cloud Instancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1578.002

has super-classes
Modify Cloud Compute Infrastructure c

Create Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CreateFile

has super-classes
System Call c
is also defined as
named individual

Create or Modify System Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1543

has super-classes
Persistence Technique c, Privilege Escalation Technique c
has sub-classes
Launch Agent c, Launch Daemon c, Systemd Service c, Windows Service c

Create Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CreateProcess

has super-classes
System Call c
is also defined as
named individual

Create Process with Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134.002

has super-classes
Access Token Manipulation c
is also defined as
named individual

Create Snapshotc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1578.001

has super-classes
Modify Cloud Compute Infrastructure c

Create Socketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CreateSocket

has super-classes
System Call c
is also defined as
named individual

Create Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CreateThread

has super-classes
System Call c
is also defined as
named individual

Creation of chroot Jail Without Changing Working Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-243

has super-classes
Improper Following of Specification by Caller c, Incorrect Resource Transfer Between Spheres c

Creation of Class Instance within a Static Code Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1063

has super-classes
Inefficient CPU Computation c

Creation of Emergent Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1229

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Covert Channel c

Creation of Immutable Text Using String Concatenationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1046

has super-classes
Inefficient CPU Computation c

Creation of Temporary File in Directory with Insecure Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-379

has super-classes
Insecure Temporary File c

Creation of Temporary File With Insecure Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-378

has super-classes
Insecure Temporary File c

Credentialc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Credential

has super-classes
Digital Artifact c
has sub-classes
Access Token c, Encrypted Credential c, Password c, Session Cookie c
is also defined as
named individual

Credential Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialAccess

has super-classes
Offensive Tactic c
is also defined as
named individual

Credential Access Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialAccessTechnique

has super-classes
Offensive Technique c
has sub-classes
Bash History c, Brute Force c, Cloud Instance Metadata API c, Credentials from Password Stores c, Credentials from Web Browsers c, Credentials in Files c, Credentials in Registry c, Exploitation for Credential Access c, Forced Authentication c, Forge Web Credentials c, Hooking c, Input Capture c, Input Prompt c, Kerberoasting c, Keychain c, LLMNR/NBT-NS Poisoning and Relay c, Man-in-the-Middle c, Modify Authentication Process c, Multi-Factor Authentication Request Generation c, Network Sniffing c, OS Credential Dumping c, Password Filter DLL c, Private Keys c, Securityd Memory c, Steal Application Access Token c, Steal Web Session Cookie c, Steal or Forge Kerberos Tickets c, Two-Factor Authentication Interception c, Unsecured Credentials c
is also defined as
named individual

Credential API Hookingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1056.004

has super-classes
Input Capture c
is also defined as
named individual

Credential Compromise Scope Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialCompromiseScopeAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

Credential Evictionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialEviction

has super-classes
Defensive Technique c
has sub-classes
Account Locking c, Authentication Cache Invalidation c, Credential Revoking c
has members
Account Locking ni, Authentication Cache Invalidation ni, Credential Revoking ni
is also defined as
named individual

Credential Hardeningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialHardening

has super-classes
Defensive Technique c
has sub-classes
Biometric Authentication c, Certificate Pinning c, Certificate-based Authentication c, Credential Rotation c, Credential Transmission Scoping c, Domain Trust Policy c, Multi-factor Authentication c, One-time Password c, Strong Password Policy c, User Account Permissions c
has members
Biometric Authentication ni, Certificate Pinning ni, Certificate-based Authentication ni, Credential Rotation ni, Credential Transmission Scoping ni, Domain Trust Policy ni, Multi-factor Authentication ni, One-time Password ni, Strong Password Policy ni, User Account Permissions ni
is also defined as
named individual

Credential Management Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialManagementSystem

has super-classes
Service Application c
is also defined as
named individual

Credential Revokingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialRevoking

has super-classes
Credential Eviction c
is also defined as
named individual

Credential Rotationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialRotation

has super-classes
Credential Hardening c
is also defined as
named individual

Credential Stuffingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1110.004

has super-classes
Brute Force c
is also defined as
named individual

Credential Transmission Scopingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CredentialTransmissionScoping

has super-classes
Credential Hardening c
is also defined as
named individual

Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1589.001

has super-classes
Gather Victim Identity Information c

Credentials from Password Storesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555

has super-classes
Credential Access Technique c
has sub-classes
Credentials from Web Browsers c, Keychain c, Password Managers c, Securityd Memory c, Windows Credential Manager c
is also defined as
named individual

Credentials from Web Browsersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1503

has super-classes
Credential Access Technique c

Credentials from Web Browsersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555.003

has super-classes
Credentials from Password Stores c
is also defined as
named individual

Credentials in Filesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1081

has super-classes
Credential Access Technique c

Credentials in Filesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.001

has super-classes
Unsecured Credentials c
is also defined as
named individual

Credentials in Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1214

has super-classes
Credential Access Technique c

Credentials in Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.002

has super-classes
Unsecured Credentials c
is also defined as
named individual

Critical Data Element Declared Publicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-766

has super-classes
Insufficient Encapsulation c

Critical Public Variable Without Final Modifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-493

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
Public Static Field Not Marked Final c

Critical Severity Vulnerabilityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CriticalVulnerability

is equivalent to
vulnerability c and (((base score dp some ) and (base score dp some )) or (severity op value Critical))
has super-classes
vulnerability c

Cron Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.003

has super-classes
Scheduled Task/Job Execution c

Cross-Site Request Forgery (CSRF)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-352

has super-classes
Insufficient Verification of Data Authenticity c
is also defined as
named individual

Cryptographic Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CryptographicKey

Is defined by
http://dbpedia.org/resource/Public-key_cryptography
has super-classes
Digital Artifact c
has sub-classes
Asymmetric Key c, Symmetric Key c

Cryptographic Operations are run Before Supporting Units are Readyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1279

has super-classes
Improper Initialization c

Custom Archive Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CustomArchiveFile

has super-classes
Archive File c
is also defined as
named individual

Custom Command and Control Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1094

has super-classes
Command and Control Technique c

Custom Cryptographic Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1024

has super-classes
Command and Control Technique c

CVSS Metricc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS

Is defined by
https://www.first.org/cvss/v3.1/specification-document
has sub-classes
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

CycleGANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CycleGAN

has super-classes
Image-to-Image Translation GAN c
is also defined as
named individual

D3FEND Catalog Thingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#D3FENDCatalogThing

has super-classes
D3FEND Thing c
has sub-classes
Agent c, Analysis of Alternatives c, Assessment c, Capability Feature c, Capability Implementation c, Information Content Entity c, Proposition c

D3FEND Use Casec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#D3FENDUseCase

has super-classes
D3FEND Use Case Thing c
is disjoint with
Target Audience c, Use Case Goal c, Use Case Prerequisite c, Use Case Procedure c, Use Case Step c

D3FEND Use Case Thingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#D3FENDUseCaseThing

has super-classes
D3FEND Thing c
has sub-classes
D3FEND Use Case c, Target Audience c, Use Case Goal c, Use Case Prerequisite c, Use Case Procedure c, Use Case Step c

Dangerous Signal Handler not Disabled During Sensitive Operationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-432

has super-classes
Signal Handler Race Condition c

Dangling Database Cursor ('Cursor Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-619

has super-classes
Transmission of Private Resources into a New Sphere ('Resource Leak') c

Data Access from Outside Expected Data Manager Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1083

has super-classes
Insufficient Encapsulation c

Data Access Operations Outside of Expected Data Manager Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1057

has super-classes
Insufficient Encapsulation c

Data Artifact Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DataArtifactServer

has super-classes
Artifact Server c

Data Compressedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1002

has super-classes
Exfiltration Technique c

Data Dependencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DataDependency

has super-classes
Dependency c
is also defined as
named individual

Data Destructionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1485

has super-classes
Impact Technique c

Data Element Aggregating an Excessively Large Number of Non-Primitive Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1043

has super-classes
Excessively Complex Data Representation c

Data Element containing Pointer Item without Proper Copy Control Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1098

has super-classes
Insufficient Adherence to Expected Conventions c

Data Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1132

has super-classes
Command and Control Technique c
has sub-classes
Non-Standard Encoding c, Standard Encoding c
is also defined as
named individual

Data Encryptedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1022

has super-classes
Exfiltration Technique c

Data Encrypted for Impactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1486

has super-classes
Impact Technique c

Data Exchange Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DataExchangeMapping

has super-classes
System Mapping c
is also defined as
named individual

Data from Cloud Storage Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1530

has super-classes
Collection Technique c

Data from Configuration Repositoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1602

has super-classes
Collection Technique c
has sub-classes
Network Device Configuration Dump c, SNMP (MIB Dump) c

Data from Information Repositoriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1213

has super-classes
Collection Technique c, Discovery Technique c
has sub-classes
Code Repositories c, Confluence c, Sharepoint c
is also defined as
named individual

Data from Local Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1005

has super-classes
Collection Technique c
is also defined as
named individual

Data from Network Shared Drivec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1039

has super-classes
Collection Technique c
is also defined as
named individual

Data from Removable Mediac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1025

has super-classes
Collection Technique c
is also defined as
named individual

Data Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DataInventory

has super-classes
Asset Inventory c
is also defined as
named individual

Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1565

has super-classes
Impact Technique c
has sub-classes
Runtime Data Manipulation c, Stored Data Manipulation c, Transmitted Data Manipulation c

Data Obfuscationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1001

has super-classes
Command and Control Technique c
has sub-classes
Junk Data c, Protocol Impersonation c, Steganography c
is also defined as
named individual

Data Resource Access without Use of Connection Poolingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1072

has super-classes
Asymmetric Resource Consumption (Amplification) c

Data Stagedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1074

has super-classes
Collection Technique c
has sub-classes
Local Data Staging c, Remote Data Staging c
is also defined as
named individual

Data Templatec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/DataTemplate

has super-classes
Mekanoid Object c

Data Transfer Size Limitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1030

has super-classes
Exfiltration Technique c
is also defined as
named individual

Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Database

has super-classes
Digital Artifact c
has sub-classes
Code Repository c, Password Database c, System Configuration Database c
is also defined as
named individual

Database Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DatabaseFile

has super-classes
File c
is also defined as
named individual

Database Queryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DatabaseQuery

has super-classes
Command c
has sub-classes
Remote Database Query c
is also defined as
named individual

Database Query String Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DatabaseQueryStringAnalysis

has super-classes
Process Analysis c
is also defined as
named individual

Database Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DatabaseServer

has super-classes
Server c
is also defined as
named individual

Datalogc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Datalog

has super-classes
Logic Programming c
is also defined as
named individual

DBSCANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DBSCAN

has super-classes
Density-based Clustering c
is also defined as
named individual

DCSyncc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.006

has super-classes
OS Credential Dumping c
is also defined as
named individual

Dead Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-561

has super-classes
Irrelevant Code c

Dead Code Eliminationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeadCodeElimination

has super-classes
Application Hardening c
is also defined as
named individual

Dead Drop Resolverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1102.001

has super-classes
Web Service c

Deadlockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-833

has super-classes
Improper Locking c

Debug Messages Revealing Unnecessary Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1295

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c

Debugger Evasionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1622

has super-classes
Defense Evasion Technique c, Discovery Technique c

Deceivec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Deceive

has super-classes
Defensive Tactic c
is also defined as
named individual

Decision Treec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecisionTree

has super-classes
Classification c
has sub-classes
C4.5 c, C5.0 c, CART c, ID3 c
is also defined as
named individual

Decision Tree Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecisionTreeRegression

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Declaration of Catch for Generic Exceptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-396

has super-classes
Improper Handling of Exceptional Conditions c, Incorrect Control Flow Scoping c, Information Loss or Omission c

Declaration of Throws for Generic Exceptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-397

has super-classes
Improper Check or Handling of Exceptional Conditions c, Incorrect Control Flow Scoping c, Information Loss or Omission c

Declaration of Variable with Unnecessarily Wide Scopec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1126

has super-classes
Improper Adherence to Coding Standards c

Decoy Artifactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyArtifact

has super-classes
Digital Artifact c
is also defined as
named individual

Decoy Environmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyEnvironment

has super-classes
Defensive Technique c
has sub-classes
Connected Honeynet c, Integrated Honeynet c, Standalone Honeynet c
has members
Connected Honeynet ni, Integrated Honeynet ni, Standalone Honeynet ni
is also defined as
named individual

Decoy Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyFile

has super-classes
Decoy Object c
is also defined as
named individual

Decoy Network Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyNetworkResource

has super-classes
Decoy Object c
is also defined as
named individual

Decoy Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyObject

has super-classes
Defensive Technique c
has sub-classes
Decoy File c, Decoy Network Resource c, Decoy Persona c, Decoy Public Release c, Decoy Session Token c, Decoy User Credential c
has members
Decoy File ni, Decoy Network Resource ni, Decoy Persona ni, Decoy Public Release ni, Decoy Session Token ni, Decoy User Credential ni
is also defined as
named individual

Decoy Personac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyPersona

has super-classes
Decoy Object c
is also defined as
named individual

Decoy Public Releasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyPublicRelease

has super-classes
Decoy Object c
is also defined as
named individual

Decoy Session Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoySessionToken

has super-classes
Decoy Object c
is also defined as
named individual

Decoy User Credentialc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DecoyUserCredential

has super-classes
Decoy Object c
is also defined as
named individual

Deep Convolutional GANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeepConvolutionalGAN

has super-classes
Image Synthesis GAN c
is also defined as
named individual

Deep Neural Network Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeepNeuralNetClassification

has super-classes
Artificial Neural Network Classification c
has sub-classes
Convolutional Neural Network c, Recurrent Neural Network c
is also defined as
named individual

Deep Q-learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeepQ-learning

has super-classes
Q-Learning c
is also defined as
named individual

Defacementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1491

has super-classes
Impact Technique c
has sub-classes
External Defacement c, Internal Defacement c

Default Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1078.001

has super-classes
Valid Accounts c
is also defined as
named individual

Default User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefaultUserAccount

has super-classes
User Account c
is also defined as
named individual

Defense Evasionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefenseEvasion

has super-classes
Offensive Tactic c
is also defined as
named individual

Defense Evasion Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefenseEvasionTechnique

has super-classes
Offensive Technique c
has sub-classes
Abuse Elevation Control Mechanism c, Access Token Manipulation c, Application Access Token c, BITS Jobs c, Binary Padding c, Build Image on Host c, Bypass User Account Control c, CMSTP c, Clear Command History c, Code Signing c, Compile After Delivery c, Compiled HTML File c, Component Firmware c, Component Object Model Hijacking c, Control Panel Items c, DLL Search Order Hijacking c, DLL Side-Loading c, Debugger Evasion c, Deobfuscate/Decode Files or Information c, Deploy Container c, Direct Volume Access c, Disabling Security Tools c, Execution Guardrails c, Exploitation for Defense Evasion c, Extra Window Memory Injection c, File Deletion c, File and Directory Permissions Modification c, Gatekeeper Bypass c, Group Policy Modification c, HISTCONTROL c, Hidden Files and Directories c, Hidden Users c, Hidden Window c, Hide Artifacts c, Hijack Execution Flow c, Image File Execution Options Injection c, Impair Defenses c, Indicator Blocking c, Indicator Removal from Tools c, Indicator Removal on Host c, Indirect Command Execution c, Install Root Certificate c, InstallUtil c, Launchctl c, Masquerading c, Modify Authentication Process c, Modify Cloud Compute Infrastructure c, Modify Registry c, Modify System Image c, Mshta c, NTFS File Attributes c, Network Boundary Bridging c, Network Share Connection Removal c, Obfuscated Files or Information c, Parent PID Spoofing c, Plist File Modification c, Plist Modification c, Pre-OS Boot c, Process Doppelgänging c, Process Hollowing c, Process Injection c, Reflective Code Loading c, Regsvcs/Regasm c, Regsvr32 c, Revert Cloud Instance c, Rogue Domain Controller c, Rootkit c, Rundll32 c, SIP and Trust Provider Hijacking c, Signed Binary Proxy Execution c, Signed Script Proxy Execution c, Software Packing c, Space after Filename c, Subvert Trust Controls c, Template Injection c, Timestomp c, Traffic Signaling c, Trusted Developer Utilities Proxy Execution c, Unused/Unsupported Cloud Regions c, Use Alternate Authentication Material c, Valid Accounts c, Virtualization/Sandbox Evasion c, Weaken Encryption c, Web Session Cookie c, XSL Script Processing c
is also defined as
named individual

Defensive Tacticc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefensiveTactic

Is defined by
http://wordnet-rdf.princeton.edu/id/05913746-n
has super-classes
D3FEND Thing c
has sub-classes
Deceive c, Detect c, Evict c, Harden c, Isolate c, Model c, Restore c
has members
Deceive ni, Detect ni, Evict ni, Harden ni, Isolate ni, Model ni

Defensive Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefensiveTechnique

has super-classes
Capability Feature c, D3FEND Thing c, Technique c
has sub-classes
Application Hardening c, Asset Inventory c, Credential Eviction c, Credential Hardening c, Decoy Environment c, Decoy Object c, Execution Isolation c, File Analysis c, File Eviction c, Identifier Analysis c, Message Analysis c, Message Hardening c, Network Isolation c, Network Mapping c, Network Traffic Analysis c, Operational Activity Mapping c, Platform Hardening c, Platform Monitoring c, Process Analysis c, Process Eviction c, Restore Access c, Restore Object c, System Mapping c, User Behavior Analysis c
is in domain of
d3fend-tactical-verb-property op, may-be-tactically-associated-with op
has members
Application Hardening ni, Asset Inventory ni, Credential Eviction ni, Credential Hardening ni, Decoy Environment ni, Decoy Object ni, Execution Isolation ni, File Analysis ni, File Eviction ni, Identifier Analysis ni, Message Analysis ni, Message Hardening ni, Network Isolation ni, Network Mapping ni, Network Traffic Analysis ni, Operational Activity Mapping ni, Platform Hardening ni, Platform Monitoring ni, Process Analysis ni, Process Eviction ni, Restore Access ni, Restore Object ni, System Mapping ni, User Behavior Analysis ni
is also defined as
named individual

Defensive Technique Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefensiveTechniqueAssessment

has super-classes
Feature Assessment c
is in range of
assesses op

Defensive Technique Claimc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DefensiveTechniqueClaim

has super-classes
Capability Feature Claim c
is in domain of
assesses op

Delete Cloud Instancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1578.003

has super-classes
Modify Cloud Compute Infrastructure c

Delete Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeleteFile

has super-classes
System Call c
is also defined as
named individual

Deletion of Data Structure Sentinelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-463

has super-classes
Improper Neutralization c

Density-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Density-basedClustering

has super-classes
Cluster Analysis c
has sub-classes
DBSCAN c
is also defined as
named individual

Density-weighted Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Density-weightedMethod

has super-classes
Active Learning c
is also defined as
named individual

Deobfuscate/Decode Files or Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1140

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Deontic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeonticLogic

has super-classes
Modal Logic c
is also defined as
named individual

Dependencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Dependency

has super-classes
Digital Artifact c
has sub-classes
Activity Dependency c, Data Dependency c, Service Dependency c, System Dependency c
is also defined as
named individual

Dependency on Vulnerable Third-Party Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1395

has super-classes
Violation of Secure Design Principles c

Deploy Containerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1610

has super-classes
Defense Evasion Technique c, Execution Technique c

Deployment of Wrong Handlerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-430

has super-classes
Insufficient Control Flow Management c

Description Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DescriptionLogic

has super-classes
Symbolic AI c
has sub-classes
OWL c
is also defined as
named individual

Descriptive Statisticsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DescriptiveStatistics

has super-classes
Statistical Method c
has sub-classes
Central Tendency c, Correlation c, Distribution Properties c, Variability c
is also defined as
named individual

Deserialization Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeserializationFunction

has super-classes
Subroutine c
is also defined as
named individual

Deserialization of Untrusted Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-502

has super-classes
Improper Control of Dynamically-Managed Code Resources c
is also defined as
named individual

Desktop Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DesktopComputer

Is defined by
http://dbpedia.org/resource/Desktop_computer
has super-classes
Personal Computer c

Detectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Detect

has super-classes
Defensive Tactic c
is also defined as
named individual

Detection of Error Condition Without Actionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-390

has super-classes
Improper Handling of Exceptional Conditions c

Detection Rulec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/DetectionRule

has super-classes
Application Rule c
has sub-classes
IOC c, Sigma Rule c, Signature c, YARA Rule c

Determine Physical Locationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1591.001

has super-classes
Gather Victim Org Information c

Develop Capabilitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1587

has super-classes
Resource Development Technique c
has sub-classes
Code Signing Certificates c, Digital Certificates c, Exploits c, Malware c

Developer Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DeveloperApplication

has super-classes
User Application c
has sub-classes
Build Tool c, Code Analyzer c, Network Traffic Analysis Software c, Test Execution Tool c, Version Control Tool c

Device Registrationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098.005

has super-classes
Account Manipulation c

Device Unlock Credential Sharingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1273

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c

DHCP Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DHCPNetworkTraffic

has super-classes
Network Traffic c
is also defined as
named individual

DHCP Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DHCPServer

Is defined by
http://dbpedia.org/resource/Dynamic_Host_Configuration_Protocol
has super-classes
Server c

DHCP Spoofingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1557.003

has super-classes
Man-in-the-Middle c
is also defined as
named individual

Dial Up Modemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DialUpModem

Is defined by
http://dbpedia.org/resource/Modem#Dial-up
has super-classes
Modem c

Digital Artifactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DigitalArtifact

has super-classes
Artifact c, Digital Object c
has sub-classes
Address Space c, Binary Large Object c, Binary Segment c, Blob c, Block Device c, Boot Loader c, Call Stack c, Certificate c, Clipboard c, Command c, Credential c, Cryptographic Key c, DNS Lookup c, Database c, Decoy Artifact c, Dependency c, Digital System c, Directory c, Display Server c, Domain Registration c, Enclave c, File Section c, File System c, File System Link c, Hardware Device c, Hardware Driver c, Identifier c, Interprocess Communication c, Intrusion Detection System c, Job Schedule c, Kernel Process Table c, Link c, Log c, Memory Address c, Memory Extent c, Metadata c, Network c, Network Flow c, Network Node c, Network Traffic c, Operating System c, Page Table c, Partition c, Partition Table c, Physical Location c, Platform c, Pointer c, Process c, Process Image c, Process Tree c, Record c, Resource c, Sensor c, Session c, Shadow Stack c, Software c, Software Package c, Stack Component c, Storage c, System Call c, Thread c, Trust Store c, User c, User Account c, User Action c, User Behavior c, User Interface c, User to User Message c, Volume c
is in domain of
d3fend-artifact-data-property dp
is in range of
hides op
has members
Network Traffic Analysis Software ni
is also defined as
named individual

Digital Certificatesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1587.003

has super-classes
Develop Capabilities c

Digital Certificatesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.004

has super-classes
Obtain Capabilities c

Digital Certificatesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596.003

has super-classes
Search Open Technical Databases c

Digital Eventc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DigitalEvent

has super-classes
D3FEND Thing c
has sub-classes
Command c, DNS Lookup c, Finding c, Machine Action c, Resource Access c, System Call c, Task Run c, User Action c

Digital Fingerprintc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DigitalFingerprint

Is defined by
https://csrc.nist.gov/glossary/term/digital_fingerprint
has super-classes
Identifier c
has sub-classes
File Hash c

Digital Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DigitalObject

has super-classes
D3FEND Thing c
has sub-classes
Digital Artifact c

Digital Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DigitalSystem

has super-classes
Digital Artifact c, System c
has sub-classes
Legacy System c
is also defined as
named individual

Dimension Reductionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DimensionReduction

has super-classes
Unsupervised Learning c
has sub-classes
Autoencoding c, Principal Components Analysis c, Singular Value Decomposition c
is also defined as
named individual

Direct Network Floodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1498.001

has super-classes
Network Denial of Service c
is also defined as
named individual

Direct Request ('Forced Browsing')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-425

has super-classes
Authentication Bypass Using an Alternate Path or Channel c, Improper Protection of Alternate Path c, Missing Authorization c

Direct Use of Unsafe JNIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-111

has super-classes
Use of Low-Level Functionality c

Direct Volume Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1006

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Directory

has super-classes
Digital Artifact c
has sub-classes
Startup Directory c, System Startup Directory c
is also defined as
named individual

Directory Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DirectoryService

has super-classes
Network Service c
is also defined as
named individual

Disable Cloud Logsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.008

has super-classes
Impair Defenses c

Disable Crypto Hardwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1600.002

has super-classes
Weaken Encryption c

Disable or Modify Cloud Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.007

has super-classes
Impair Defenses c

Disable or Modify System Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.004

has super-classes
Impair Defenses c
is also defined as
named individual

Disable or Modify Toolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.001

has super-classes
Impair Defenses c
is also defined as
named individual

Disable Windows Event Loggingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.002

has super-classes
Impair Defenses c
is also defined as
named individual

Disabling Security Toolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1089

has super-classes
Defense Evasion Technique c

Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Discovery

has super-classes
Offensive Tactic c
is also defined as
named individual

Discovery Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DiscoveryTechnique

has super-classes
Offensive Technique c
has sub-classes
Account Discovery c, Application Window Discovery c, Browser Bookmark Discovery c, Cloud Infrastructure Discovery c, Cloud Service Dashboard c, Cloud Service Discovery c, Cloud Storage Object Discovery c, Container and Resource Discovery c, Data from Information Repositories c, Debugger Evasion c, Domain Trust Discovery c, File and Directory Discovery c, Group Policy Discovery c, Network Service Scanning c, Network Share Discovery c, Network Sniffing c, Password Policy Discovery c, Peripheral Device Discovery c, Permission Groups Discovery c, Process Discovery c, Query Registry c, Remote System Discovery c, Security Software Discovery c, Software Discovery c, System Information Discovery c, System Location Discovery c, System Network Configuration Discovery c, System Network Connections Discovery c, System Owner/User Discovery c, System Service Discovery c, System Time Discovery c
is also defined as
named individual

Discriminant Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DiscriminantAnalysis

has super-classes
Multivariate Analysis c
is also defined as
named individual

Disk Content Wipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1488

has super-classes
Impact Technique c

Disk Content Wipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1561.001

has super-classes
Disk Wipe c
is also defined as
named individual

Disk Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DiskEncryption

has super-classes
Platform Hardening c
is also defined as
named individual

Disk Structure Wipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1487

has super-classes
Impact Technique c

Disk Structure Wipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1561.002

has super-classes
Disk Wipe c
is also defined as
named individual

Disk Wipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1561

has super-classes
Impact Technique c
has sub-classes
Disk Content Wipe c, Disk Structure Wipe c

Display Adapterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DisplayAdapter

has super-classes
Output Device c
is also defined as
named individual

Display Device Driverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DisplayDeviceDriver

has super-classes
Hardware Driver c
is also defined as
named individual

Display Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DisplayServer

has super-classes
Digital Artifact c
is also defined as
named individual

Distributed Component Object Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.003

has super-classes
Remote Services c

Distribution Propertiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DistributionProperties

has super-classes
Descriptive Statistics c
has sub-classes
Kurtosis c, Moments c, Skewness c
is also defined as
named individual

Distribution-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Distribution-basedClustering

has super-classes
Cluster Analysis c
has sub-classes
Expectation-maximization Clustering c
is also defined as
named individual

Divide By Zeroc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-369

has super-classes
Incorrect Calculation c

Divisive Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DivisiveClustering

has super-classes
Hierarchical Clustering c
is also defined as
named individual

DLL Search Order Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1038

has super-classes
Defense Evasion Technique c, Persistence Technique c, Privilege Escalation Technique c

DLL Search Order Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.001

has super-classes
Hijack Execution Flow c
is also defined as
named individual

DLL Side-Loadingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1073

has super-classes
Defense Evasion Technique c

DLL Side-Loadingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.002

has super-classes
Hijack Execution Flow c
is also defined as
named individual

DMA Device Enabled Too Early in Boot Phasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1190

has super-classes
Incorrect Behavior Order c

DNN-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNN-basedClustering

has super-classes
ANN-based Clustering c
is also defined as
named individual

DNSc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1071.004

has super-classes
Application Layer Protocol c
is also defined as
named individual

DNSc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.002

has super-classes
Gather Victim Network Information c

DNS Allowlistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSAllowlisting

has super-classes
Network Isolation c
is also defined as
named individual

DNS Calculationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1568.003

has super-classes
Dynamic Resolution c

DNS Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSDenylisting

has super-classes
Network Isolation c
has sub-classes
Forward Resolution Domain Denylisting c, Forward Resolution IP Denylisting c, Reverse Resolution Domain Denylisting c, Reverse Resolution IP Denylisting c
has members
Forward Resolution Domain Denylisting ni, Forward Resolution IP Denylisting ni, Reverse Resolution Domain Denylisting ni, Reverse Resolution IP Denylisting ni
is also defined as
named individual

DNS Lookupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSLookup

has super-classes
Digital Artifact c, Digital Event c
has sub-classes
Internet DNS Lookup c, Intranet DNS Lookup c
is also defined as
named individual

DNS Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Outbound Internet DNS Lookup Traffic c
is also defined as
named individual

DNS Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSRecord

has super-classes
Record c

DNS Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSServer

Is defined by
http://dbpedia.org/resource/Name_server
has super-classes
Server c

DNS Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.002

has super-classes
Acquire Infrastructure c

DNS Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.002

has super-classes
Compromise Infrastructure c

DNS Traffic Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DNSTrafficAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

DNS/Passive DNSc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596.001

has super-classes
Search Open Technical Databases c

Documentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Document

has super-classes
Information Content Entity c
has sub-classes
Advisory c, Analysis Report c, Article c, Patent c, Policy c, Specification c, User Manual c

Document Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DocumentFile

has super-classes
File c
has sub-classes
Email c, Email Attachment c, HTML File c, Multimedia Document File c, Office Application File c
has members
Adobe PDF File 1.3 ni, Microsoft Word DOC File ni, Microsoft Word DOCB File ni, Microsoft Word DOCM File ni, Microsoft Word DOCX File ni, Microsoft Word DOT File ni, Microsoft Word DOTM File ni, Microsoft Word DOTX File ni, Microsoft Word WBK File ni
is also defined as
named individual

Domain Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1087.002

has super-classes
Create Account c
is also defined as
named individual

Domain Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1136.002

has super-classes
Create Account c

Domain Account Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainAccountMonitoring

has super-classes
User Behavior Analysis c
is also defined as
named individual

Domain Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1078.002

has super-classes
Valid Accounts c
is also defined as
named individual

Domain Controller Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556.001

has super-classes
Modify Authentication Process c

Domain Frontingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1090.004

has super-classes
Proxy c
is also defined as
named individual

Domain Frontingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1172

has super-classes
Command and Control Technique c

Domain Generation Algorithmsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1483

has super-classes
Command and Control Technique c

Domain Generation Algorithmsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1568.002

has super-classes
Dynamic Resolution c

Domain Groupsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1069.002

has super-classes
Permission Groups Discovery c

Domain Namec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainName

has super-classes
Identifier c
has members
ASCII Domain Name ni, FQDN Domain Name ni, Hostname ni, Internationalized Domain Name ni
is also defined as
named individual

Domain Name Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainNameReputationAnalysis

has super-classes
Identifier Reputation Analysis c
is also defined as
named individual

Domain Propertiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.001

has super-classes
Gather Victim Network Information c

Domain Registrationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainRegistration

has super-classes
Digital Artifact c
has members
WHOIS Compatible Domain Registration ni
is also defined as
named individual

Domain Trust Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1482

has super-classes
Discovery Technique c

Domain Trust Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1484.002

has super-classes
Group Policy Modification c

Domain Trust Policyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainTrustPolicy

has super-classes
Credential Hardening c
is also defined as
named individual

Domain User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DomainUserAccount

has super-classes
User Account c
has sub-classes
Global User Account c
is also defined as
named individual

Domainsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.001

has super-classes
Acquire Infrastructure c

Domainsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.001

has super-classes
Compromise Infrastructure c

Double Decoding of the Same Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-174

has super-classes
Encoding Error c, Multiple Operations on Resource in Single-Operation Context c

Double File Extensionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.007

has super-classes
Masquerading c
is also defined as
named individual

Double Freec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-415

has super-classes
Expired Pointer Dereference c, Multiple Releases of Same Resource or Handle c, Operation on Resource in Wrong Phase of Lifetime c

Double-Checked Lockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-609

has super-classes
Improper Locking c

Doubled Character XSS Manipulationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-85

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Downgrade Attackc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.010

has super-classes
Impair Defenses c
is also defined as
named individual

Downgrade System Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1601.002

has super-classes
Modify System Image c

Download of Code Without Integrity Checkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-494

has super-classes
Incorrect Resource Transfer Between Spheres c, Insufficient Verification of Data Authenticity c

Drive-by Compromisec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1189

has super-classes
Initial Access Technique c
is also defined as
named individual

Drive-by Targetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608.004

has super-classes
Stage Capabilities c

Driver Load Integrity Checkingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DriverLoadIntegrityChecking

has super-classes
Platform Hardening c
is also defined as
named individual

Duplicate Key in Associative List (Alist)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-462

has super-classes
Use of Multiple Resources with Duplicate Identifier c

Dylib Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1157

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Dylib Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.004

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Dyna-Qc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Dyna-Q

has super-classes
Model-based Reinforcement Learning c
is also defined as
named individual

Dynamic Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DynamicAnalysis

has super-classes
File Analysis c
is also defined as
named individual

Dynamic Analysis Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#DynamicAnalysisTool

Is defined by
http://dbpedia.org/resource/Dynamic_program_analysis
has super-classes
Code Analyzer c

Dynamic Data Exchangec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1173

has super-classes
Execution Technique c

Dynamic Data Exchange Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1559.002

has super-classes
Inter-Process Communication Execution c

Dynamic Resolutionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1568

has super-classes
Command and Control Technique c
has sub-classes
DNS Calculation c, Domain Generation Algorithms c, Fast Flux DNS c
is also defined as
named individual

Dynamic Variable Evaluationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-627

has super-classes
Improper Control of Dynamically-Identified Variables c

Dynamic-link Library Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.001

has super-classes
Process Injection c
is also defined as
named individual

EJB Bad Practices: Use of AWT Swingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-575

has super-classes
Use of Low-Level Functionality c

EJB Bad Practices: Use of Class Loaderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-578

has super-classes
Improper Following of Specification by Caller c

EJB Bad Practices: Use of Java I/Oc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-576

has super-classes
Use of Low-Level Functionality c

EJB Bad Practices: Use of Socketsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-577

has super-classes
Improper Following of Specification by Caller c

EJB Bad Practices: Use of Synchronization Primitivesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-574

has super-classes
Incorrect Synchronization c, Use of Low-Level Functionality c

Elevated Execution with Promptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1514

has super-classes
Privilege Escalation Technique c

Elevated Execution with Promptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1548.004

has super-classes
Abuse Elevation Control Mechanism c
is also defined as
named individual

Emailc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Email

has super-classes
Document File c
has members
MSG Email File ni
is also defined as
named individual

Email Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1087.003

has super-classes
Account Discovery c

Email Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1585.002

has super-classes
Establish Accounts c

Email Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1586.002

has super-classes
Compromise Accounts c

Email Addressc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/EmailAddress

An email address identifies an email box to which messages are delivered.
has super-classes
Observable c

Email Addressesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1589.002

has super-classes
Gather Victim Identity Information c

Email Attachmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmailAttachment

has super-classes
Document File c
is also defined as
named individual

Email Collectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1114

has super-classes
Collection Technique c
has sub-classes
Email Forwarding Rule c, Local Email Collection c, Remote Email Collection c
is also defined as
named individual

Email Filteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmailFiltering

has super-classes
Inbound Traffic Filtering c
is also defined as
named individual

Email Forwarding Rulec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1114.003

has super-classes
Email Collection c
is also defined as
named individual

Email Hiding Rulesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.008

has super-classes
Hide Artifacts c
is also defined as
named individual

Email Removalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmailRemoval

has super-classes
File Removal c
is also defined as
named individual

Email Rulec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmailRule

has super-classes
Application Rule c
is also defined as
named individual

Email Senderc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/EmailSenderString

A string showing a combination of a name and the email address in angle brackets.
Example
Britney Greenman <mexragasu@gmail.com>
has super-classes
Observable c

Email Subjectc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/EmailSubjectString

Example
Fwd: Fwd: Re: RE: RE: LOL
has super-classes
Observable c

Embedded Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmbeddedComputer

Is defined by
http://dbpedia.org/resource/Embedded_system
has super-classes
Client Computer c

Embedded Malicious Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-506

has super-classes
Hidden Functionality c
has sub-classes
Logic/Time Bomb c, Spyware c, Trapdoor c, Trojan Horse c

Emondc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1519

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Emondc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.014

has super-classes
Event Triggered Execution c
is also defined as
named individual

Employee Namesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1589.003

has super-classes
Gather Victim Identity Information c

Empty Code Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1071

has super-classes
Irrelevant Code c
has sub-classes
Empty Exception Block c, Empty Synchronized Block c

Empty Exception Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1069

has super-classes
Empty Code Block c

Empty Password in Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-258

has super-classes
Password in Configuration File c, Weak Password Requirements c

Empty Synchronized Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-585

has super-classes
Empty Code Block c

Emulated File Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EmulatedFileAnalysis

has super-classes
File Analysis c
is also defined as
named individual

Enclavec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Enclave

has super-classes
Digital Artifact c
is also defined as
named individual

Encoding Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-172

has super-classes
Improper Neutralization c
has sub-classes
Double Decoding of the Same Data c, Improper Handling of Alternate Encoding c, Improper Handling of Mixed Encoding c, Improper Handling of URL Encoding (Hex Encoding) c, Improper Handling of Unicode Encoding c

Encrypted Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1573

has super-classes
Command and Control Technique c
has sub-classes
Asymmetric Cryptography c, Symmetric Cryptography c
is also defined as
named individual

Encrypted Credentialc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EncryptedCredential

has super-classes
Credential c
has sub-classes
Encrypted Password c
is also defined as
named individual

Encrypted Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EncryptedPassword

has super-classes
Encrypted Credential c, Password c

Encrypted Tunnelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EncryptedTunnels

has super-classes
Network Isolation c
is also defined as
named individual

Endpoint Denial of Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1499

has super-classes
Impact Technique c
has sub-classes
Application Exhaustion Flood c, Application or System Exploitation c, OS Exhaustion Flood c

Endpoint Health Beaconc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EndpointHealthBeacon

has super-classes
Operating System Monitoring c
is also defined as
named individual

Endpoint Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EndpointSensor

has super-classes
Sensor c
has sub-classes
Application Inventory Sensor c, File System Sensor c, Firmware Sensor c, Host Configuration Sensor c, Kernel API Sensor c
is also defined as
named individual

Ensemble Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EnsembleLearning

has super-classes
Machine Learning c
has sub-classes
Bayes Optimal Classifier c, Bayesian Model Averaging c, Bayesian Model Combination c, Boosting c, Bucket of Models c, Resampling Ensemble c, Stacking c, Voting c
is also defined as
named individual

Environmental Keyingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1480.001

has super-classes
Execution Guardrails c

Epistemic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EpistemicLogic

has super-classes
Modal Logic c
is also defined as
named individual

Equivalence Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EquivalenceMatching

has super-classes
Logical Rules c
has sub-classes
Exact Matching c, String Equivalence Matching c
is also defined as
named individual

Escape to Hostc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1611

has super-classes
Privilege Escalation Technique c

Establish Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1585

has super-classes
Resource Development Technique c
has sub-classes
Email Accounts c, Social Media Accounts c

Estimationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Estimation

has super-classes
Inferential Statistics c
has sub-classes
Interval Estimation c, Point Estimation c
is also defined as
named individual

Eval Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EvalFunction

has super-classes
Subroutine c
is also defined as
named individual

Event Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EventLog

has super-classes
Log c
has sub-classes
Command History Log c, Task Run Log c
is also defined as
named individual

Event Triggered Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546

has super-classes
Persistence Technique c, Privilege Escalation Technique c
has sub-classes
.bash_profile and .bashrc c, Accessibility Features c, AppCert DLLs c, AppInit DLLs c, Application Shimming c, Change Default File Association c, Component Object Model Hijacking c, Emond c, Image File Execution Options Injection c, LC_LOAD_DYLIB Addition c, Netsh Helper DLL c, PowerShell Profile c, Screensaver c, Trap c, Windows Management Instrumentation Event Subscription c

Evictc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Evict

has super-classes
Defensive Tactic c
is also defined as
named individual

Eviction Latencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#EvictionLatency

has super-classes
Latency c
has members
non-real-time-eviction ni, real-time-eviction ni

Exact Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExactMatching

has super-classes
Equivalence Matching c, Numeric Pattern Matching c
is also defined as
named individual

Exception Handlerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExceptionHandler

has super-classes
Subroutine c

Exception Handler Pointer Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExceptionHandlerPointerValidation

has super-classes
Application Hardening c
is also defined as
named individual

Excessive Attack Surfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1125

has super-classes
Excessive Code Complexity c

Excessive Code Complexityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1120

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Excessive Attack Surface c, Excessive Halstead Complexity c, Excessive McCabe Cyclomatic Complexity c, Excessive Number of Inefficient Server-Side Data Accesses c, Excessive Use of Self-Modifying Code c, Excessive Use of Unconditional Branching c, Excessively Deep Nesting c, Invokable Control Element with Signature Containing an Excessive Number of Parameters c, Invokable Control Element with Variadic Parameters c, Loop Condition Value Update within the Loop c, Modules with Circular Dependencies c, Source Code File with Excessive Number of Lines of Code c, Unconditional Control Flow Transfer outside of Switch Block c

Excessive Data Query Operations in a Large Data Tablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1049

has super-classes
Inefficient CPU Computation c

Excessive Execution of Sequential Searches of Data Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1067

has super-classes
Inefficient CPU Computation c

Excessive Halstead Complexityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1122

has super-classes
Excessive Code Complexity c

Excessive Index Range Scan for a Data Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1094

has super-classes
Asymmetric Resource Consumption (Amplification) c

Excessive Iterationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-834

has super-classes
Insufficient Control Flow Management c
has sub-classes
Loop with Unreachable Exit Condition ('Infinite Loop') c, Uncontrolled Recursion c, Use of Blocking Code in Single-threaded, Non-blocking Context c

Excessive McCabe Cyclomatic Complexityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1121

has super-classes
Excessive Code Complexity c

Excessive Number of Inefficient Server-Side Data Accessesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1060

has super-classes
Excessive Code Complexity c

Excessive Platform Resource Consumption within a Loopc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1050

has super-classes
Asymmetric Resource Consumption (Amplification) c

Excessive Reliance on Global Variablesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1108

has super-classes
Insufficient Adherence to Expected Conventions c

Excessive Use of Hard-Coded Literals in Initializationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1052

has super-classes
Improper Initialization c

Excessive Use of Self-Modifying Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1123

has super-classes
Excessive Code Complexity c

Excessive Use of Unconditional Branchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1119

has super-classes
Excessive Code Complexity c

Excessively Complex Data Representationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1093

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Class with Excessive Number of Child Classes c, Class with Excessively Deep Inheritance c, Data Element Aggregating an Excessively Large Number of Non-Primitive Elements c, Multiple Inheritance from Concrete Classes c

Excessively Deep Nestingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1124

has super-classes
Excessive Code Complexity c

Exchange Email Delegate Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098.002

has super-classes
Account Manipulation c
is also defined as
named individual

Execc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Exec

has super-classes
System Call c
is also defined as
named individual

Executable Allowlistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutableAllowlisting

has super-classes
Execution Isolation c
is also defined as
named individual

Executable Binaryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutableBinary

has super-classes
Executable File c
has members
Linux ELF File 32bit ni, Linux ELF File 64bit ni, PE32 Executable File ni, PE32+ Executable File ni
is also defined as
named individual

Executable Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutableDenylisting

has super-classes
Execution Isolation c
is also defined as
named individual

Executable Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutableFile

has super-classes
File c
has sub-classes
Executable Binary c, Executable Script c
is also defined as
named individual

Executable Installer File Permissions Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.005

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Executable Regular Expression Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-624

has super-classes
Improper Neutralization of Special Elements used in a Command ('Command Injection') c

Executable Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutableScript

has super-classes
Executable File c
has sub-classes
Init Script c, Python Script File c, System Init Script c, User Init Script c, User Startup Script File c, Web Script File c
has members
Bash Script File ni, Javascript File ni, Lua Script File ni, Powershell Script File ni, Ruby Script File ni, Windows Batch File ni
is also defined as
named individual

Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Execution

has super-classes
Offensive Tactic c
is also defined as
named individual

Execution After Redirect (EAR)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-698

has super-classes
Always-Incorrect Control Flow Implementation c, Incorrect Control Flow Scoping c

Execution Guardrailsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1480

has super-classes
Defense Evasion Technique c
has sub-classes
Environmental Keying c

Execution Isolationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutionIsolation

has super-classes
Defensive Technique c
has sub-classes
Executable Allowlisting c, Executable Denylisting c, Hardware-based Process Isolation c, IO Port Restriction c, Kernel-based Process Isolation c
has members
Executable Denylisting ni, Hardware-based Process Isolation ni, IO Port Restriction ni, Kernel-based Process Isolation ni
is also defined as
named individual

Execution Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExecutionTechnique

has super-classes
Offensive Technique c
has sub-classes
AppleScript c, CMSTP c, Command and Scripting Interpreter Execution c, Compiled HTML File c, Container Administration Command c, Control Panel Items c, Deploy Container c, Dynamic Data Exchange c, Exploitation for Client Execution c, InstallUtil c, Inter-Process Communication Execution c, LSASS Driver c, Launchctl c, Local Job Scheduling c, Mshta c, Native API Execution c, PowerShell c, Regsvcs/Regasm c, Regsvr32 c, Rundll32 c, Scheduled Task/Job Execution c, Service Execution c, Shared Modules Execution c, Signed Binary Proxy Execution c, Signed Script Proxy Execution c, Software Deployment Tools Execution c, Space after Filename c, System Services c, Trap c, User Execution c, Windows Management Instrumentation Execution c, Windows Remote Management c
is also defined as
named individual

Execution with Unnecessary Privilegesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-250

has super-classes
Improper Privilege Management c, Violation of Secure Design Principles c

Exfiltrationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Exfiltration

has super-classes
Offensive Tactic c
is also defined as
named individual

Exfiltration Over Alternative Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1048

has super-classes
Exfiltration Technique c
has sub-classes
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol c, Exfiltration Over Symmetric Encrypted Non-C2 Protocol c, Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol c
is also defined as
named individual

Exfiltration Over Asymmetric Encrypted Non-C2 Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1048.002

has super-classes
Exfiltration Over Alternative Protocol c
is also defined as
named individual

Exfiltration Over Bluetoothc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1011.001

has super-classes
Exfiltration Over Other Network Medium c

Exfiltration Over C2 Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1041

has super-classes
Exfiltration Technique c
is also defined as
named individual

Exfiltration Over Other Network Mediumc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1011

has super-classes
Exfiltration Technique c
has sub-classes
Exfiltration Over Bluetooth c
is also defined as
named individual

Exfiltration Over Physical Mediumc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1052

has super-classes
Exfiltration Technique c
has sub-classes
Exfiltration over USB c

Exfiltration Over Symmetric Encrypted Non-C2 Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1048.001

has super-classes
Exfiltration Over Alternative Protocol c
is also defined as
named individual

Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1048.003

has super-classes
Exfiltration Over Alternative Protocol c
is also defined as
named individual

Exfiltration over USBc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1052.001

has super-classes
Exfiltration Over Physical Medium c
is also defined as
named individual

Exfiltration Over Web Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1567

has super-classes
Exfiltration Technique c
has sub-classes
Exfiltration to Cloud Storage c, Exfiltration to Code Repository c
is also defined as
named individual

Exfiltration Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExfiltrationTechnique

has super-classes
Offensive Technique c
has sub-classes
Automated Exfiltration c, Data Compressed c, Data Encrypted c, Data Transfer Size Limits c, Exfiltration Over Alternative Protocol c, Exfiltration Over C2 Channel c, Exfiltration Over Other Network Medium c, Exfiltration Over Physical Medium c, Exfiltration Over Web Service c, Scheduled Transfer c, Transfer Data to Cloud Account c
is also defined as
named individual

Exfiltration to Cloud Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1567.002

has super-classes
Exfiltration Over Web Service c
is also defined as
named individual

Exfiltration to Code Repositoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1567.001

has super-classes
Exfiltration Over Web Service c
is also defined as
named individual

Expectation-maximization Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Expectation-maximizationClustering

has super-classes
Distribution-based Clustering c
is also defined as
named individual

Expected Behavior Violationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-440

has super-classes
Incorrect Provision of Specified Functionality c

Expected Error Reductionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExpectedErrorReduction

has super-classes
Active Learning c
is also defined as
named individual

Expected Model Changec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExpectedModelChange

has super-classes
Active Learning c
is also defined as
named individual

Expired Pointer Dereferencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-825

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c, Operation on a Resource after Expiration or Release c
has sub-classes
Double Free c, Use After Free c

Explicit Call to Finalize()c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-586

has super-classes
Insufficient Adherence to Expected Conventions c

Exploit Code Maturityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-ExploitCodeMaturity

This metric measures the likelihood of the vulnerability being attacked, and is typically based on the current state of exploit techniques, exploit code availability, or active, “in-the-wild” exploitation. Public availability of easy-to-use exploit code increases the number of potential attackers by including those who are unskilled, thereby increasing the severity of the vulnerability. Initially, real-world exploitation may only be theoretical. Publication of proof-of-concept code, functional exploit code, or sufficient technical details necessary to exploit the vulnerability may follow. Furthermore, the exploit code available may progress from a proof-of-concept demonstration to exploit code that is successful in exploiting the vulnerability consistently. In severe cases, it may be delivered as the payload of a network-based worm or virus or other automated attack tools.
is equivalent to
{ Functional , High , Not Defined (X) , Proof-of-Concept , Unproven (U) }
has super-classes
CVSS Metric c
is in range of
exploit code maturity op
has members
Functional ni, High ni, Not Defined (X) ni, Proof-of-Concept ni, Unproven (U) ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Exploit Public-Facing Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1190

has super-classes
Initial Access Technique c
is also defined as
named individual

Exploitation for Client Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1203

has super-classes
Execution Technique c
is also defined as
named individual

Exploitation for Credential Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1212

has super-classes
Credential Access Technique c
is also defined as
named individual

Exploitation for Defense Evasionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1211

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Exploitation for Privilege Escalationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1068

has super-classes
Privilege Escalation Technique c
is also defined as
named individual

Exploitation of Remote Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1210

has super-classes
Lateral Movement Technique c
is also defined as
named individual

Exploitation of Transient Instruction Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CAPEC-663

has super-classes
Common Attack Pattern c
is also defined as
named individual

Exploitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1587.004

has super-classes
Develop Capabilities c

Exploitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.005

has super-classes
Obtain Capabilities c

Exposed Dangerous Method or Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-749

has super-classes
Improper Access Control c
has sub-classes
Exposed IOCTL with Insufficient Access Control c, Exposed Unsafe ActiveX Method c

Exposed IOCTL with Insufficient Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-782

has super-classes
Exposed Dangerous Method or Function c

Exposed Unsafe ActiveX Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-618

has super-classes
Exposed Dangerous Method or Function c

Exposure of Access Control List Files to an Unauthorized Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-529

has super-classes
Files or Directories Accessible to External Parties c

Exposure of Backup File to an Unauthorized Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-530

has super-classes
Files or Directories Accessible to External Parties c

Exposure of Core Dump File to an Unauthorized Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-528

has super-classes
Files or Directories Accessible to External Parties c

Exposure of Data Element to Wrong Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-488

has super-classes
Exposure of Resource to Wrong Sphere c

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-403

has super-classes
Transmission of Private Resources into a New Sphere ('Resource Leak') c

Exposure of Information Through Directory Listingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-548

has super-classes
Exposure of Sensitive System Information to an Unauthorized Control Sphere c

Exposure of Information Through Shell Error Messagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-535

has super-classes
Externally-Generated Error Message Containing Sensitive Information c

Exposure of Private Personal Information to an Unauthorized Actorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-359

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c

Exposure of Resource to Wrong Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-668

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Access to Critical Private Variable via Public Method c, Array Declared Public, Final, and Static c, Assumed-Immutable Data is Stored in Writable Memory c, Binding to an Unrestricted IP Address c, Cloneable Class Containing Sensitive Information c, Critical Public Variable Without Final Modifier c, Exposure of Data Element to Wrong Session c, Exposure of Sensitive Information to an Unauthorized Actor c, External Control of Critical State Data c, Files or Directories Accessible to External Parties c, Improper Isolation of Shared Resources in Network On Chip (NoC) c, Improper Isolation of Shared Resources on System-on-a-Chip (SoC) c, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') c, Incorrect Permission Assignment for Critical Resource c, Insecure Temporary File c, Insufficiently Protected Credentials c, J2EE Misconfiguration: Entity Bean Declared Remote c, Passing Mutable Objects to an Untrusted Method c, Public cloneable() Method Without Final ('Object Hijack') c, Returning a Mutable Object to an Untrusted Caller c, Serializable Class Containing Sensitive Data c, Struts: Non-private Field in ActionForm Class c, Transmission of Private Resources into a New Sphere ('Resource Leak') c, Uncontrolled Search Path Element c, Unquoted Search Path or Element c, Use of Cache Containing Sensitive Information c, Use of Externally-Controlled Format String c, Use of Implicit Intent for Sensitive Communication c, Use of Inner Class Containing Sensitive Data c, finalize() Method Declared Public c

Exposure of Sensitive Information Due to Incompatible Policiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-213

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c

Exposure of Sensitive Information Through Data Queriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-202

has super-classes
Exposure of Sensitive Information Through Metadata c

Exposure of Sensitive Information Through Metadatac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1230

has super-classes
Improper Authorization c
has sub-classes
Exposure of Sensitive Information Through Data Queries c, Improper Authorization of Index Containing Sensitive Information c

Exposure of Sensitive Information to an Unauthorized Actorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-200

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
Debug Messages Revealing Unnecessary Information c, Device Unlock Credential Sharing c, Exposure of Private Personal Information to an Unauthorized Actor c, Exposure of Sensitive Information Due to Incompatible Policies c, Exposure of Sensitive System Information Due to Uncleared Debug Information c, Exposure of Sensitive System Information to an Unauthorized Control Sphere c, Generation of Error Message Containing Sensitive Information c, Insertion of Sensitive Information Into Debugging Code c, Insertion of Sensitive Information Into Sent Data c, Insertion of Sensitive Information into Externally-Accessible File or Directory c, Observable Discrepancy c

Exposure of Sensitive System Information Due to Uncleared Debug Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1258

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c, Improper Removal of Sensitive Information Before Storage or Transfer c

Exposure of Sensitive System Information to an Unauthorized Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-497

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c
has sub-classes
Exposure of Information Through Directory Listing c, Invocation of Process Using Visible Sensitive Information c

Exposure of Version-Control Repository to an Unauthorized Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-527

has super-classes
Files or Directories Accessible to External Parties c

Exposure of WSDL File Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-651

has super-classes
Insertion of Sensitive Information into Externally-Accessible File or Directory c

Expression is Always Falsec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-570

has super-classes
Improper Adherence to Coding Standards c

Expression is Always Truec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-571

has super-classes
Improper Adherence to Coding Standards c

External Content Inclusion Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExternalContentInclusionFunction

has super-classes
Subroutine c
is also defined as
named individual

External Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExternalControl

has super-classes
D3FEND Thing c
has sub-classes
CCI Control c, NIST Control c

External Control of Assumed-Immutable Web Parameterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-472

has super-classes
External Control of Critical State Data c, Modification of Assumed-Immutable Data (MAID) c

External Control of Critical State Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-642

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
External Control of Assumed-Immutable Web Parameter c, External Control of File Name or Path c, External Control of System or Configuration Setting c, Reliance on Cookies without Validation and Integrity Checking c, Untrusted Search Path c

External Control of File Name or Pathc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-73

has super-classes
External Control of Critical State Data c, Externally Controlled Reference to a Resource in Another Sphere c
has sub-classes
Process Control c

External Control of System or Configuration Settingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-15

has super-classes
External Control of Critical State Data c, Externally Controlled Reference to a Resource in Another Sphere c

External Defacementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1491.002

has super-classes
Defacement c
is also defined as
named individual

External Influence of Sphere Definitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-673

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Untrusted Search Path c

External Initialization of Trusted Variables or Data Storesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-454

has super-classes
Improper Initialization c

External Knowledge Basec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ExternalKnowledgeBase

has super-classes
Information Content Entity c, Technique Reference c
has members
Reference - CAR-2013-01-002: Autorun Differences - MITRE ni, Reference - CAR-2013-01-003: SMB Events Monitoring - MITRE ni, Reference - CAR-2013-02-003: Processes Spawning cmd.exe - MITRE ni, Reference - CAR-2013-02-008: Simultaneous Logins on a Host - MITRE ni, Reference - CAR-2013-02-012: User Logged in to Multiple Hosts - MITRE ni, Reference - CAR-2013-03-001: Reg.exe called from Command Shell - MITRE ni, Reference - CAR-2013-04-002: Quick execution of a series of suspicious commands - MITRE ni, Reference - CAR-2013-05-002: Suspicious Run Locations - MITRE ni, Reference - CAR-2013-05-003: SMB Write Request - MITRE ni, Reference - CAR-2013-05-004: Execution with AT - MITRE ni, Reference - CAR-2013-05-005: SMB Copy and Execution - MITRE ni, Reference - CAR-2013-07-001: Suspicious Arguments - MITRE ni, Reference - CAR-2013-07-002: RDP Connection Detection - MITRE ni, Reference - CAR-2013-07-005: Command Line Usage of Archiving Software - MITRE ni, Reference - CAR-2013-08-001: Execution with schtasks - MITRE ni, Reference - CAR-2013-09-003: SMB Session Setups - MITRE ni, Reference - CAR-2013-09-005: Service Outlier Executables - MITRE ni, Reference - CAR-2013-10-001: User Login Activity Monitoring - MITRE ni, Reference - CAR-2013-10-002: DLL Injection via Load Library - MITRE ni, Reference - CAR-2014-02-001: Service Binary Modifications - MITRE ni, Reference - CAR-2014-03-001: SMB Write Request - NamedPipes - MITRE ni, Reference - CAR-2014-03-005: Remotely Launched Executables via Services - MITRE ni, Reference - CAR-2014-03-006: RunDLL32.exe monitoring - MITRE ni, Reference - CAR-2014-04-003: Powershell Execution - MITRE ni, Reference - CAR-2014-05-001: RPC Activity - MITRE ni, Reference - CAR-2014-05-002: Services launching Cmd - MITRE ni, Reference - CAR-2014-07-001: Service Search Path Interception - MITRE ni, Reference - CAR-2014-11-002: Outlier Parents of Cmd - MITRE ni, Reference - CAR-2014-11-003: Debuggers for Accessibility Applications - MITRE ni, Reference - CAR-2014-11-005: Remote Registry - MITRE ni, Reference - CAR-2014-11-006: Windows Remote Management (WinRM) - MITRE ni, Reference - CAR-2014-11-007: Remote Windows Management Instrumentation (WMI) over RPC - MITRE ni, Reference - CAR-2014-11-008: Command Launched from WinLogon - MITRE ni, Reference - CAR-2014-12-001: Remotely Launched Executables via WMI - MITRE ni, Reference - CAR-2015-04-001: Remotely Scheduled Tasks via AT - MITRE ni, Reference - CAR-2015-04-002: Remotely Scheduled Tasks via Schtasks - MITRE ni, Reference - CAR-2015-07-001: All Logins Since Last Boot - MITRE ni, Reference - CAR-2016-03-001: Host Discovery Commands - MITRE ni, Reference - CAR-2016-03-002: Create Remote Process via WMIC - MITRE ni, Reference - CAR-2016-04-002: User Activity from Clearing Event Logs - MITRE ni, Reference - CAR-2016-04-003: User Activity from Stopping Windows Defensive Services - MITRE ni, Reference - CAR-2016-04-004: Successful Local Account Login ni, Reference - CAR-2016-04-005: Remote Desktop Logon - MITRE ni, Reference - CAR-2019-04-001: UAC Bypass - MITRE ni, Reference - CAR-2019-04-002: Generic Regsvr32 - MITRE ni, Reference - CAR-2019-04-003: Squiblydoo - MITRE ni, Reference - CAR-2019-04-004: Credential Dumping via Mimikatz - MITRE ni, Reference - CAR-2019-07-001: Access Permission Modification - MITRE ni, Reference - CAR-2019-07-002: Lsass Process Dump via Procdump - MITRE ni, Reference - CAR-2019-08-001: Credential Dumping via Windows Task Manager - MITRE ni, Reference - CAR-2019-08-002: Active Directory Dumping via NTDSUtil - MITRE ni, Reference - CAR-2020-04-001: Shadow Copy Deletion - MITRE ni, Reference - CAR-2020-05-001: MiniDump of LSASS - MITRE ni, Reference - CAR-2020-05-003: Rare LolBAS Command Lines - MITRE ni, Reference - CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities - MITRE ni, Reference - CAR-2020-09-001: Scheduled Task - FileAccess - MITRE ni, Reference - CAR-2020-09-002: Component Object Model Hijacking - MITRE ni, Reference - CAR-2020-09-003: Indicator Blocking - Driver Unloaded - MITRE ni, Reference - CAR-2020-09-004: Credentials in Files & Registry - MITRE ni, Reference - CAR-2020-09-005: AppInit DLLs - MITRE ni, Reference - CAR-2020-11-001: Boot or Logon Initialization Scripts - MITRE ni, Reference - CAR-2020-11-002: Local Network Sniffing - MITRE ni, Reference - CAR-2020-11-003: DLL Injection with Mavinject - MITRE ni, Reference - CAR-2020-11-004: Processes Started From Irregular Parent - MITRE ni, Reference - CAR-2020-11-005: Clear Powershell Console Command History - MITRE ni, Reference - CAR-2020-11-006: Local Permission Group Discovery - MITRE ni, Reference - CAR-2020-11-007: Network Share Connection Removal - MITRE ni, Reference - CAR-2020-11-008: MSBuild and msxsl - MITRE ni, Reference - CAR-2020-11-009: Compiled HTML Access - MITRE ni, Reference - CAR-2020-11-010: CMSTP - MITRE ni, Reference - CAR-2020-11-011: Registry Edit from Screensaver ni, Reference - CAR-2021-01-002: Unusually Long Command Line Strings - MITRE ni, Reference - CAR-2021-01-003: Clearing Windows Logs with Wevtutil - MITRE ni, Reference - CAR-2021-01-004: Unusual Child Process for Spoolsv.Exe or Connhost.Exe - MITRE ni, Reference - CAR-2021-01-006: Unusual Child Process spawned using DDE exploit - MITRE ni, Reference - CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt - MITRE ni, Reference - CAR-2021-01-008: Disable UAC - MITRE ni, Reference - CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe - MITRE ni, Reference - CAR-2021-02-001: Webshell-Indicative Process Tree - MITRE ni, Reference - CAR-2021-02-002: Get System Elevation - MITRE ni, Reference - CAR-2021-04-001: Common Windows Process Masquerading - MITRE ni, Reference - CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store - MITRE ni, Reference - CAR-2021-05-002: Batch File Write to System32 - MITRE ni, Reference - CAR-2021-05-003: BCDEdit Failure Recovery Modification - MITRE ni, Reference - CAR-2021-05-004: BITS Job Persistence - MITRE ni, Reference - CAR-2021-05-005: BITSAdmin Download File - MITRE ni, Reference - CAR-2021-05-006: CertUtil Download With URLCache and Split Arguments - MITRE ni, Reference - CAR-2021-05-007: CertUtil Download With VerifyCtl and Split Arguments - MITRE ni, Reference - CAR-2021-05-008: Certutil exe certificate extraction - MITRE ni, Reference - CAR-2021-05-009: CertUtil With Decode Argument - MITRE ni, Reference - CAR-2021-05-010: Create local admin accounts using net exe - MITRE ni, Reference - CAR-2021-05-011: Create Remote Thread into LSASS - MITRE ni

External Proxyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1090.002

has super-classes
Proxy c
is also defined as
named individual

External Remote Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1133

has super-classes
Initial Access Technique c, Persistence Technique c
is also defined as
named individual

Externally Controlled Reference to a Resource in Another Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-610

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
External Control of File Name or Path c, External Control of System or Configuration Setting c, Improper Restriction of XML External Entity Reference c, Session Fixation c, URL Redirection to Untrusted Site ('Open Redirect') c, Unintended Proxy or Intermediary ('Confused Deputy') c, Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') c

Externally-Generated Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-211

has super-classes
Generation of Error Message Containing Sensitive Information c
has sub-classes
Exposure of Information Through Shell Error Message c, Java Runtime Error Message Containing Sensitive Information c, Servlet Runtime Error Message Containing Sensitive Information c

Extra Window Memory Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.011

has super-classes
Process Injection c

Extra Window Memory Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1181

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c

Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Rangesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1316

has super-classes
Improper Access Control c

Failure to Disable Reserved Bitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1209

has super-classes
Improper Adherence to Coding Standards c

Failure to Handle Incomplete Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-239

has super-classes
Improper Handling of Structural Elements c

Failure to Handle Missing Parameterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-234

has super-classes
Improper Handling of Parameters c

Failure to Sanitize Paired Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-157

has super-classes
Improper Neutralization of Special Elements c

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-75

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Neutralization of Equivalent Special Elements c

Fallback Channelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1008

has super-classes
Command and Control Technique c
is also defined as
named individual

Fast Flux DNSc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1568.001

has super-classes
Dynamic Resolution c

Feature Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FeatureAssessment

has super-classes
Assessment c
has sub-classes
Admin Feature Assessment c, Defensive Technique Assessment c

Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#File

has super-classes
Resource c
has sub-classes
Archive File c, Certificate File c, Configuration File c, Container Image c, Database File c, Document File c, Executable File c, Log File c, NTFS Link c, Object File c, Operating System File c, Password File c, Shortcut File c, Software Library File c, Symbolic Link c
is in domain of
has URL op, has size dp
is also defined as
named individual

File Access Pattern Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileAccessPatternAnalysis

has super-classes
Process Analysis c
is also defined as
named individual

File Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileAnalysis

has super-classes
Defensive Technique c
has sub-classes
Dynamic Analysis c, Emulated File Analysis c, File Content Analysis c, File Hashing c
has members
Dynamic Analysis ni, Emulated File Analysis ni, File Content Analysis ni, File Hashing ni
is also defined as
named individual

File and Directory Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1083

has super-classes
Discovery Technique c
is also defined as
named individual

File and Directory Permissions Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1222

has super-classes
Defense Evasion Technique c
has sub-classes
Linux and Mac File and Directory Permissions Modification c, Windows File and Directory Permissions Modification c
is also defined as
named individual

File Carvingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileCarving

has super-classes
Network Traffic Analysis c
is also defined as
named individual

File Content Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileContentAnalysis

has super-classes
File Analysis c
has sub-classes
File Content Rules c
has members
File Content Rules ni
is also defined as
named individual

File Content Rulesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileContentRules

has super-classes
File Content Analysis c
is also defined as
named individual

File Creation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileCreationAnalysis

has super-classes
System Call Analysis c
is also defined as
named individual

File Deletionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.004

has super-classes
Indicator Removal on Host c
is also defined as
named individual

File Deletionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1107

has super-classes
Defense Evasion Technique c

File Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileEncryption

has super-classes
Platform Hardening c
is also defined as
named individual

File Evictionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileEviction

has super-classes
Defensive Technique c
has sub-classes
File Removal c
has members
File Removal ni
is also defined as
named individual

File Hashc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileHash

has super-classes
Digital Fingerprint c
is also defined as
named individual

File Hash Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileHashReputationAnalysis

has super-classes
Identifier Reputation Analysis c
is also defined as
named individual

File Hashingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileHashing

has super-classes
File Analysis c
is also defined as
named individual

File Integrity Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileIntegrityMonitoring

has super-classes
Platform Monitoring c
has members
File Integrity Monitoring ni
is also defined as
named individual

File Namec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/FileName

has super-classes
Observable c

File Path Open Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FilePathOpenFunction

has super-classes
Subroutine c
is also defined as
named individual

File Removalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileRemoval

has super-classes
File Eviction c
has sub-classes
Email Removal c
has members
Email Removal ni
is also defined as
named individual

File Sectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileSection

has super-classes
Digital Artifact c
has sub-classes
Image Segment c, Resource Fork c
is also defined as
named individual

File Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileServer

has super-classes
Server c
is also defined as
named individual

File Share Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileShareService

has super-classes
Network Service c

File Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileSystem

has super-classes
Digital Artifact c
is also defined as
named individual

File System Metadatac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileSystemMetadata

has super-classes
Metadata c
is also defined as
named individual

File System Permissions Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1044

has super-classes
Persistence Technique c, Privilege Escalation Technique c

File System Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileSystemSensor

has super-classes
Endpoint Sensor c
is also defined as
named individual

File Transfer Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FileTransferNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Internet File Transfer Traffic c, Intranet File Transfer Traffic c, Outbound Internet File Transfer Traffic c
is also defined as
named individual

File Transfer Protocolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1071.002

has super-classes
Application Layer Protocol c
is also defined as
named individual

Files or Directories Accessible to External Partiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-552

has super-classes
Exposure of Resource to Wrong Sphere c, Improper Authorization c
has sub-classes
Command Shell in Externally Accessible Directory c, Exposure of Access Control List Files to an Unauthorized Control Sphere c, Exposure of Backup File to an Unauthorized Control Sphere c, Exposure of Core Dump File to an Unauthorized Control Sphere c, Exposure of Version-Control Repository to an Unauthorized Control Sphere c, Storage of File With Sensitive Data Under FTP Root c, Storage of File with Sensitive Data Under Web Root c, Use of Persistent Cookies Containing Sensitive Information c

filterc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Filter

A logical statement specifying scope for a Report or a Task Pattern. Identifies one or more Artifacts with or without specific relationships between them, essentially a subgraph. e.g. a FILTER statement within a SPARQL query.
has super-classes
Mekanoid Object c

finalize() Method Declared Publicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-583

has super-classes
Exposure of Resource to Wrong Sphere c

finalize() Method Without super.finalize()c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-568

has super-classes
Improper Following of Specification by Caller c, Incomplete Cleanup c

Findingc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Detection

has super-classes
Digital Event c

Finger Print Scanner Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FingerPrintScannerInputDevice

Is defined by
http://dbpedia.org/resource/Fingerprint#Fingerprint_sensors
has super-classes
Image Scanner Input Device c

Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Firewall

has super-classes
Network Node c
has sub-classes
Application Layer Firewall c

Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Firmware

has super-classes
Software c
has sub-classes
Microcode c, Peripheral Firmware c, System Firmware c
is also defined as
named individual

Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1592.003

has super-classes
Gather Victim Host Information c

Firmware Behavior Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FirmwareBehaviorAnalysis

has super-classes
Platform Monitoring c
is also defined as
named individual

Firmware Corruptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1495

has super-classes
Impact Technique c

Firmware Embedded Monitoring Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FirmwareEmbeddedMonitoringCode

has super-classes
Platform Monitoring c
is also defined as
named individual

Firmware Not Updateablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1277

has super-classes
Reliance on Component That is Not Updateable c

Firmware Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FirmwareSensor

has super-classes
Endpoint Sensor c
is also defined as
named individual

Firmware Verificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FirmwareVerification

has super-classes
Platform Monitoring c
has sub-classes
Peripheral Firmware Verification c, System Firmware Verification c
has members
Peripheral Firmware Verification ni, System Firmware Verification ni
is also defined as
named individual

First-order Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#First-orderLogic

has super-classes
Predicate Logic c
is also defined as
named individual

First-stage Boot Loaderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#First-stageBootLoader

has super-classes
Boot Loader c

Flash Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FlashMemory

Is defined by
https://dbpedia.org/page/Flash_memory
has super-classes
Secondary Storage c

Floating Point Comparison with Incorrect Operatorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1077

has super-classes
Incorrect Comparison c

Forced Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1187

has super-classes
Credential Access Technique c
is also defined as
named individual

Forecastingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Forecasting

has super-classes
Analytical Purpose c
has sub-classes
Trajectory Prediction c
is disjoint with
Classifying c, Media Generation c, Matching c, Summarizing c

Forge Web Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1606

has super-classes
Credential Access Technique c
has sub-classes
SAML Tokens c, Web Cookies c

Forward Proxy Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ForwardProxyServer

Is defined by
http://dbpedia.org/resource/Open_proxy
has super-classes
Proxy Server c

Forward Resolution Domain Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ForwardResolutionDomainDenylisting

has super-classes
DNS Denylisting c
has sub-classes
Hierarchical Domain Denylisting c, Homoglyph Denylisting c
has members
Hierarchical Domain Denylisting ni, Homoglyph Denylisting ni
is also defined as
named individual

Forward Resolution IP Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ForwardResolutionIPDenylisting

has super-classes
DNS Denylisting c
is also defined as
named individual

Free Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FreeMemory

has super-classes
System Call c
is also defined as
named individual

Free of Memory not on the Heapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-590

has super-classes
Mismatched Memory Management Routines c

Free of Pointer not at Start of Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-761

has super-classes
Release of Invalid Pointer or Reference c

Function Call With Incorrect Argument Typec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-686

has super-classes
Function Call with Incorrectly Specified Arguments c

Function Call With Incorrect Number of Argumentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-685

has super-classes
Function Call with Incorrectly Specified Arguments c

Function Call With Incorrect Order of Argumentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-683

has super-classes
Function Call with Incorrectly Specified Arguments c

Function Call With Incorrect Variable or Reference as Argumentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-688

has super-classes
Function Call with Incorrectly Specified Arguments c

Function Call With Incorrectly Specified Argument Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-687

has super-classes
Function Call with Incorrectly Specified Arguments c
has sub-classes
Use of umask() with chmod-style Argument c

Function Call with Incorrectly Specified Argumentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-628

has super-classes
Improper Following of Specification by Caller c
has sub-classes
Function Call With Incorrect Argument Type c, Function Call With Incorrect Number of Arguments c, Function Call With Incorrect Order of Arguments c, Function Call With Incorrect Variable or Reference as Argument c, Function Call With Incorrectly Specified Argument Value c

Fuzzy Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#FuzzyLogic

has super-classes
Symbolic AI c
is also defined as
named individual

Gated Recurrent Unitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GatedRecurrentUnit

has super-classes
Recurrent Neural Network c
is also defined as
named individual

Gatekeeper Bypassc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1144

has super-classes
Defense Evasion Technique c

Gatekeeper Bypassc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.001

has super-classes
Subvert Trust Controls c
is also defined as
named individual

Gather Victim Host Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1592

has super-classes
Reconnaissance Technique c
has sub-classes
Client Configurations c, Firmware c, Hardware c, Software c

Gather Victim Identity Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1589

has super-classes
Reconnaissance Technique c
has sub-classes
Credentials c, Email Addresses c, Employee Names c

Gather Victim Network Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590

has super-classes
Reconnaissance Technique c
has sub-classes
DNS c, Domain Properties c, IP Addresses c, Network Security Appliances c, Network Topology c, Network Trust Dependencies c

Gather Victim Org Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1591

has super-classes
Reconnaissance Technique c
has sub-classes
Business Relationships c, Determine Physical Locations c, Identify Business Tempo c, Identify Roles c

Generation of Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-209

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c, Improper Handling of Exceptional Conditions c
has sub-classes
Externally-Generated Error Message Containing Sensitive Information c, Self-generated Error Message Containing Sensitive Information c, Server-generated Error Message Containing Sensitive Information c

Generation of Incorrect Security Tokensc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1270

has super-classes
Improper Access Control c

Generation of Predictable IV with CBC Modec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-329

has super-classes
Generation of Weak Initialization Vector (IV) c, Improper Following of Specification by Caller c

Generation of Predictable Numbers or Identifiersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-340

has super-classes
Use of Insufficiently Random Values c
has sub-classes
Predictable Exact Value from Previous Values c, Predictable Value Range from Previous Values c, Predictable from Observable State c

Generation of Weak Initialization Vector (IV)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1204

has super-classes
Use of Insufficiently Random Values c
has sub-classes
Generation of Predictable IV with CBC Mode c

Generative Adversarial Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GenerativeAdversarialNetwork

has super-classes
Unsupervised Learning c
has sub-classes
Image Synthesis GAN c, Image-to-Image Translation GAN c, SeqGAN c
is also defined as
named individual

Geometric Meanc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GeometricMean

has super-classes
Central Tendency c
is disjoint with
Harmonic Mean c, Mean c, Median c, Mode c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Get Open Socketsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetOpenSockets

has super-classes
System Call c
is also defined as
named individual

Get Open Windowsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetOpenWindows

has super-classes
System Call c
has members
get foreground window ni
is also defined as
named individual

Get Running Processesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetRunningProcesses

has super-classes
System Call c
is also defined as
named individual

Get Screen Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetScreenCapture

has super-classes
System Call c
is also defined as
named individual

Get System Config Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetSystemConfigValue

has super-classes
System Config System Call c
has sub-classes
Get System Network Config Value c
has members
reg open key a ni, reg open key ex a ni, reg open key ex w ni, reg open key transacted a ni, reg open key transacted w ni, reg open key w ni
is also defined as
named individual

Get System Network Config Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetSystemNetworkConfigValue

has super-classes
Get System Config Value c
is also defined as
named individual

Get System Timec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GetSystemTime

has super-classes
System Call c
is also defined as
named individual

Global User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GlobalUserAccount

has super-classes
Domain User Account c
is also defined as
named individual

Golden Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1558.001

has super-classes
Steal or Forge Kerberos Tickets c
is also defined as
named individual

Goodman and Kruskal's Gammac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GoodmanAndKruskalsGamma

has super-classes
Rank Correlation c
is also defined as
named individual

GPTc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GPT

has super-classes
Transformer-based Learning c
is also defined as
named individual

Gradient-Boosted Decision Treec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GradientBoostedDecisionTree

has super-classes
CART c
is also defined as
named individual

Graph-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Graph-basedClustering

has super-classes
Cluster Analysis c
has sub-classes
K-Center Clustering c, Spectral Clustering c
is also defined as
named individual

Graph-based Semi-supervised Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Graph-basedSemi-supervisedLearning

has super-classes
Semi-supervised Transductive Learning c
is also defined as
named individual

Graphical User Interfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GraphicalUserInterface

has super-classes
User Interface c
is also defined as
named individual

Graphics Card Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GraphicsCardFirmware

has super-classes
Peripheral Firmware c

Graphics Processing Unitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GraphicsProcessingUnit

has super-classes
Processor c

Grid-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Grid-basedClustering

has super-classes
High-dimension Clustering c
is also defined as
named individual

Grid-CNNc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Grid-CNN

has super-classes
Convolutional Neural Network c
is also defined as
named individual

Group Policyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GroupPolicy

has super-classes
Access Control Configuration c
is also defined as
named individual

Group Policy Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1615

has super-classes
Discovery Technique c
is also defined as
named individual

Group Policy Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1484

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c
has sub-classes
Domain Trust Modification c, Group Policy Modification c
is also defined as
named individual

Group Policy Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1484.001

has super-classes
Group Policy Modification c

Group Policy Preferencesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.006

has super-classes
Unsecured Credentials c
is also defined as
named individual

Groupingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Grouping

has super-classes
Summarizing c
is disjoint with
Clustering c, Histogramming c

Guessable CAPTCHAc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-804

has super-classes
Incorrect Authorization c, Weak Authentication c

GUI Input Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1056.002

has super-classes
Input Capture c
is also defined as
named individual

Guidancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Guidance

has super-classes
Policy c

Guideline Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#GuidelineReference

has super-classes
Policy Reference c
has members
Reference - Audit User Account Management ni, Reference - Cybersecurity Incident and Vulnerability Response Playbooks ni, Reference - Digital Identity Guidelines 800-63-3 ni, Reference - NIST Special Publication 800-160 Volume 1 - System Security Engineering ni, Reference - NIST Special Publication 800-37 Revision 2 - Risk Management Framework for Information Systems and Organizations ni, Reference - NIST Special Publication 800-53A Revision 5 - Assessing Security and Privacy Controls in Information Systems and Organizations ni, Reference - NISTIR 8011 Volume 1 - Automation Support for Security Control Assessments ni, Reference - Platform Firmware Resiliency Guidelines - NIST ni, Reference - Red Hat Enterprise Linux 8 Security Technical Implementation Guide ni, Reference - Securing Web Transactions ni, Reference - Securing Web Transactions TLS Server Certificate Management - Appendix A Passive Inspection ni, Reference - Windows 10 STIG ni

Hard Disk Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HardDiskFirmware

has super-classes
Peripheral Firmware c

Hardenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Harden

has super-classes
Defensive Tactic c
is also defined as
named individual

Hardwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1592.001

has super-classes
Gather Victim Host Information c

Hardware Additionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1200

has super-classes
Initial Access Technique c
is also defined as
named individual

Hardware Allows Activation of Test or Debug Logic at Runtimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1313

has super-classes
Improper Access Control c

Hardware Child Block Incorrectly Connected to Parent Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1276

has super-classes
Improper Access Control c

Hardware Component Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HardwareComponentInventory

has super-classes
Asset Inventory c
is also defined as
named individual

Hardware Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HardwareDevice

has super-classes
Digital Artifact c, Physical Artifact c
has sub-classes
Input Device c, Memory Management Unit Component c, Output Device c, Primary Storage c, Processor c, Processor Component c, Removable Media Device c, Secondary Storage c, Security Token c, Tertiary Storage c
is also defined as
named individual

Hardware Driverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HardwareDriver

has super-classes
Digital Artifact c
has sub-classes
Display Device Driver c
is also defined as
named individual

Hardware Internal or Debug Modes Allow Override of Locksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1234

has super-classes
Improper Locking c

Hardware Logic Contains Race Conditionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1298

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c

Hardware Logic with Insecure De-Synchronization between Control and Data Channelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1264

has super-classes
Incorrect Synchronization c

Hardware-based Process Isolationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Hardware-basedProcessIsolation

has super-classes
Execution Isolation c
is also defined as
named individual

Harmonic Meanc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HarmonicMean

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Mean c, Median c, Mode c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Hashc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Hash

A hash is a grouping of characteristics unique to the result of applying a mathematical algorithm that maps data of arbitrary size to a bit string (the 'hash') and is a one-way function, that is, a function which is practically infeasible to invert. This is commonly used for integrity checking of data. [based on https://en.wikipedia.org/wiki/Cryptographic_hash_function]
has super-classes
Identifier c, Mekanoid Thing c
has sub-classes
MD5 Hash c, SHA-1 Hash c, SHA-256 Hash c, SHA-512 Hash c

Heap Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HeapSegment

has super-classes
Process Segment c

Heap-based Buffer Overflowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-122

has super-classes
Access of Memory Location After End of Buffer c, Out-of-bounds Write c

Heterogeneous Asymmetric Feature-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HeterogeneousAsymmetricFeature-basedTransferLearning

has super-classes
Heterogeneous Transfer Learning c
is also defined as
named individual

Heterogeneous Feature-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HeterogeneousFeature-basedTransferLearning

has super-classes
Heterogeneous Transfer Learning c
is also defined as
named individual

Heterogeneous Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HeterogeneousTransferLearning

has super-classes
Transfer Learning c
has sub-classes
Heterogeneous Asymmetric Feature-based Transfer Learning c, Heterogeneous Feature-based Transfer Learning c
is also defined as
named individual

Hidden File Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.005

has super-classes
Hide Artifacts c
is also defined as
named individual

Hidden Files and Directoriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1158

has super-classes
Defense Evasion Technique c, Persistence Technique c

Hidden Files and Directoriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.001

has super-classes
Hide Artifacts c
is also defined as
named individual

Hidden Functionalityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-912

has super-classes
Incorrect Provision of Specified Functionality c
has sub-classes
Embedded Malicious Code c

Hidden Usersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1147

has super-classes
Defense Evasion Technique c

Hidden Usersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.002

has super-classes
Hide Artifacts c
is also defined as
named individual

Hidden Windowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1143

has super-classes
Defense Evasion Technique c

Hidden Windowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.003

has super-classes
Hide Artifacts c
is also defined as
named individual

Hide Artifactsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564

has super-classes
Defense Evasion Technique c
has sub-classes
Email Hiding Rules c, Hidden File System c, Hidden Files and Directories c, Hidden Users c, Hidden Window c, NTFS File Attributes c, Process Argument Spoofing c, Resource Forking c, Run Virtual Instance c, VBA Stomping c

Hierarchical Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HierarchicalClustering

has super-classes
Cluster Analysis c
has sub-classes
Agglomerative Clustering c, Divisive Clustering c
is also defined as
named individual

Hierarchical Domain Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HierarchicalDomainDenylisting

has super-classes
Forward Resolution Domain Denylisting c
is also defined as
named individual

High Severity Vulnerabilityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/HighVulnerability

is equivalent to
vulnerability c and (((base score dp some ) and (base score dp some )) or (severity op value High))
has super-classes
vulnerability c

High-dimension Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#High-dimensionClustering

has super-classes
Cluster Analysis c
has sub-classes
Correlation Clustering c, Grid-based Clustering c, Projected Clustering c, Projection-based Clustering c
is also defined as
named individual

Higher-order Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Higher-orderLogic

has super-classes
Predicate Logic c
is also defined as
named individual

Hijack Execution Flowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574

has super-classes
Defense Evasion Technique c, Persistence Technique c, Privilege Escalation Technique c
has sub-classes
COR_PROFILER c, DLL Search Order Hijacking c, DLL Side-Loading c, Dylib Hijacking c, Executable Installer File Permissions Weakness c, KernelCallbackTable c, LD_PRELOAD c, Path Interception by PATH Environment Variable c, Path Interception by Search Order Hijacking c, Path Interception by Unquoted Path c, Services File Permissions Weakness c, Services Registry Permissions Weakness c

HISTCONTROLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1148

has super-classes
Defense Evasion Technique c

Histogrammingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Histogramming

has super-classes
Summarizing c
is disjoint with
Clustering c, Grouping c

Homogenous Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HomogenousTransferLearning

has super-classes
Transfer Learning c
has sub-classes
Asymmetric Feature-based Transfer Learning c, Hybrid-based Transfer Learning c, Instance-based Transfer Learning c, Parameter-based Transfer Learning c, Relational-based Transfer Learning c, Symmetric Feature-based Transfer Learning c
is also defined as
named individual

Homoglyph Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HomoglyphDenylisting

has super-classes
Forward Resolution Domain Denylisting c
is also defined as
named individual

Homoglyph Detectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HomoglyphDetection

has super-classes
Identifier Analysis c
is also defined as
named individual

Hookingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1179

has super-classes
Credential Access Technique c, Persistence Technique c, Privilege Escalation Technique c

Hostc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Host

has super-classes
Network Node c
has sub-classes
Client Computer c, Server c
is also defined as
named individual

Host Configuration Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HostConfigurationSensor

has super-classes
Endpoint Sensor c
is also defined as
named individual

Host Groupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HostGroup

has super-classes
Access Control Group c
is also defined as
named individual

Host-based Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Host-basedFirewall

has super-classes
System Software c
is also defined as
named individual

Hostnamec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Hostname

has super-classes
Identifier c
is also defined as
named individual

HTML Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HTMLFile

has super-classes
Document File c
has sub-classes
Microsoft HTML Application c

HTML Smugglingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.006

has super-classes
Obfuscated Files or Information c
is also defined as
named individual

Human Input Device Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HumanInputDeviceFirmware

has super-classes
Peripheral Firmware c

Hybrid-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Hybrid-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Hypothesis Testingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#HypothesisTesting

has super-classes
Inferential Statistics c
has sub-classes
Non-Parametric Tests c, Parametric Tests c
is also defined as
named individual

ID3c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ID3

has super-classes
Decision Tree c
is also defined as
named individual

Identifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Identifier

has super-classes
Digital Artifact c
has sub-classes
ASN c, Digital Fingerprint c, Domain Name c, Hash c, Hostname c, IP Address c, MAC Address c, Network Socket c, URL c
is in domain of
addresses op
is in range of
addressed-by op
is also defined as
named individual

Identifier Activity Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IdentifierActivityAnalysis

has super-classes
Identifier Analysis c
is also defined as
named individual

Identifier Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IdentifierAnalysis

has super-classes
Defensive Technique c
has sub-classes
Homoglyph Detection c, Identifier Activity Analysis c, Identifier Reputation Analysis c, URL Analysis c
has members
Homoglyph Detection ni, Identifier Activity Analysis ni, Identifier Reputation Analysis ni, URL Analysis ni
is also defined as
named individual

Identifier Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IdentifierReputationAnalysis

has super-classes
Identifier Analysis c
has sub-classes
Domain Name Reputation Analysis c, File Hash Reputation Analysis c, IP Reputation Analysis c, URL Reputation Analysis c
has members
Domain Name Reputation Analysis ni, File Hash Reputation Analysis ni, IP Reputation Analysis ni, URL Reputation Analysis ni
is also defined as
named individual

Identify Business Tempoc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1591.003

has super-classes
Gather Victim Org Information c

Identify Rolesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1591.004

has super-classes
Gather Victim Org Information c

IIS Componentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505.004

has super-classes
Server Software Component c
is also defined as
named individual

Image Code Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImageCodeSegment

has super-classes
Image Segment c
has members
AMD64 Code Segment ni, ARM32 Code Segment ni, X86 Code Segment ni
is also defined as
named individual

Image Data Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImageDataSegment

has super-classes
Image Segment c
is also defined as
named individual

Image File Execution Options Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1183

has super-classes
Defense Evasion Technique c, Persistence Technique c, Privilege Escalation Technique c

Image File Execution Options Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.012

has super-classes
Event Triggered Execution c
is also defined as
named individual

Image Scanner Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImageScannerInputDevice

Is defined by
http://dbpedia.org/resource/Image_scanner
has super-classes
Video Input Device c
has sub-classes
Barcode Scanner Input Device c, Finger Print Scanner Input Device c

Image Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImageSegment

has super-classes
Binary Segment c, File Section c
has sub-classes
Image Code Segment c, Image Data Segment c

Image Synthesis GANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImageSynthesisGAN

has super-classes
Generative Adversarial Network c
has sub-classes
Deep Convolutional GAN c, Progressively Growing GAN c, StyleGAN c
is also defined as
named individual

Image-to-Image Translation GANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Image-to-ImageTranslationGAN

has super-classes
Generative Adversarial Network c
has sub-classes
CycleGAN c, Pix2Pix c
is also defined as
named individual

Impactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Impact

has super-classes
Offensive Tactic c
is also defined as
named individual

Impact Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImpactTechnique

has super-classes
Offensive Technique c
has sub-classes
Account Access Removal c, Data Destruction c, Data Encrypted for Impact c, Data Manipulation c, Defacement c, Disk Content Wipe c, Disk Structure Wipe c, Disk Wipe c, Endpoint Denial of Service c, Firmware Corruption c, Inhibit System Recovery c, Network Denial of Service c, Resource Hijacking c, Runtime Data Manipulation c, Service Stop c, Stored Data Manipulation c, System Shutdown/Reboot c, Transmitted Data Manipulation c
is also defined as
named individual

Impair Command History Loggingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.003

has super-classes
Impair Defenses c
is also defined as
named individual

Impair Defensesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562

has super-classes
Defense Evasion Technique c
has sub-classes
Disable Cloud Logs c, Disable Windows Event Logging c, Disable or Modify Cloud Firewall c, Disable or Modify System Firewall c, Disable or Modify Tools c, Downgrade Attack c, Impair Command History Logging c, Indicator Blocking c, Safe Mode Boot c

Impersonate Userc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImpersonateUser

has super-classes
System Call c
has members
Impersonate User ni
is also defined as
named individual

Implant Container Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1525

has super-classes
Persistence Technique c
is also defined as
named individual

Import Library Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ImportLibraryFunction

has super-classes
Subroutine c
is also defined as
named individual

Improper Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-284

has super-classes
Weakness c
has sub-classes
Access Control Check Implemented After Asset is Accessed c, CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations c, Exposed Dangerous Method or Function c, Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges c, Generation of Incorrect Security Tokens c, Hardware Allows Activation of Test or Debug Logic at Runtime c, Hardware Child Block Incorrectly Connected to Parent System c, Improper Access Control Applied to Mirrored or Aliased Memory Regions c, Improper Access Control for Register Interface c, Improper Access Control for Volatile Memory Containing Boot Code c, Improper Access Control in Fabric Bridge c, Improper Authentication c, Improper Authorization c, Improper Handling of Overlap Between Protected Memory Ranges c, Improper Management of Sensitive Trace Data c, Improper Ownership Management c, Improper Physical Access Control c, Improper Prevention of Lock Bit Modification c, Improper Privilege Management c, Improper Protection for Outbound Error Messages and Alert Signals c, Improper Restriction of Communication Channel to Intended Endpoints c, Improper Restriction of Security Token Assignment c, Improper Restriction of Write-Once Bit Fields c, Improper Setting of Bus Controlling Capability in Fabric End-point c, Improper Translation of Security Attributes by Fabric Bridge c, Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation c, Inclusion of Undocumented Features or Chicken Bits c, Incorrect Chaining or Granularity of Debug Components c, Incorrect Conversion of Security Identifiers c, Incorrect Decoding of Security Identifiers c, Incorrect User Management c, Insecure Security Identifier Mechanism c, Insufficient Granularity of Access Control c, Missing Protection for Mirrored Regions in On-Chip Fabric Firewall c, Mutable Attestation or Measurement Reporting Data c, On-Chip Debug and Test Interface With Improper Access Control c, Origin Validation Error c, Policy Privileges are not Assigned Consistently Between Control and Data Agents c, Policy Uses Obsolete Encoding c, Security-Sensitive Hardware Controls with Missing Lock Bit Protection c, Unauthorized Error Injection Can Degrade Hardware Redundancy c

Improper Access Control Applied to Mirrored or Aliased Memory Regionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1257

has super-classes
Improper Access Control c

Improper Access Control for Register Interfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1262

has super-classes
Improper Access Control c

Improper Access Control for Volatile Memory Containing Boot Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1274

has super-classes
Improper Access Control c

Improper Access Control in Fabric Bridgec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1317

has super-classes
Improper Access Control c

Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-781

has super-classes
Improper Validation of Specified Index, Position, or Offset in Input c

Improper Adherence to Coding Standardsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-710

has super-classes
Weakness c
has sub-classes
Active Debug Code c, Architecture with Number of Horizontal Layers Outside of Expected Range c, Compilation with Insufficient Warnings or Errors c, Declaration of Variable with Unnecessarily Wide Scope c, Excessive Code Complexity c, Excessively Complex Data Representation c, Expression is Always False c, Expression is Always True c, Failure to Disable Reserved Bits c, Improper Following of Specification by Caller c, Inconsistency Between Implementation and Documented Design c, Incorrect Provision of Specified Functionality c, Insufficient Adherence to Expected Conventions c, Insufficient Encapsulation c, Insufficient Technical Documentation c, Invokable Control Element with Large Number of Outward Calls c, Irrelevant Code c, J2EE Framework: Saving Unserializable Objects to Disk c, Missing Serialization Control Element c, NULL Pointer Dereference c, Omitted Break Statement in Switch c, Reliance on Insufficiently Trustworthy Component c, Reliance on Runtime Component in Generated Code c, Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c, Runtime Resource Management Control Element in a Component Built to Run on Application Servers c, Serializable Data Element Containing non-Serializable Item Elements c, Use of Obsolete Function c, Use of Prohibited Code c, Use of Redundant Code c, Use of Same Invokable Control Element in Multiple Architectural Layers c, Violation of Secure Design Principles c

Improper Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-287

has super-classes
Improper Access Control c
has sub-classes
Improper Certificate Validation c, Missing Authentication for Critical Function c, Overly Restrictive Account Lockout Mechanism c, Weak Authentication c
is also defined as
named individual

Improper Authorizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-285

has super-classes
Improper Access Control c
has sub-classes
Exposure of Sensitive Information Through Metadata c, Files or Directories Accessible to External Parties c, Improper Export of Android Application Components c, Improper Restriction of Software Interfaces to Hardware Features c, Incorrect Authorization c, Incorrect Permission Assignment for Critical Resource c, Missing Authorization c, Security Version Number Mutable to Older Versions c, Unprotected Confidential Information on Device is Accessible by OSAT Vendors c, Use of Implicit Intent for Sensitive Communication c

Improper Authorization in Handler for Custom URL Schemec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-939

has super-classes
Missing Authorization c

Improper Authorization of Index Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-612

has super-classes
Exposure of Sensitive Information Through Metadata c

Improper Certificate Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-295

has super-classes
Improper Authentication c
has sub-classes
Improper Check for Certificate Revocation c, Improper Following of a Certificate's Chain of Trust c, Improper Validation of Certificate Expiration c, Improper Validation of Certificate with Host Mismatch c, Missing Validation of OpenSSL Certificate c

Improper Check for Certificate Revocationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-299

has super-classes
Improper Certificate Validation c, Improper Resource Shutdown or Release c
has sub-classes
Missing Check for Certificate Revocation after Initial Check c

Improper Check for Dropped Privilegesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-273

has super-classes
Improper Check for Unusual or Exceptional Conditions c, Privilege Dropping / Lowering Errors c

Improper Check for Unusual or Exceptional Conditionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-754

has super-classes
Improper Check or Handling of Exceptional Conditions c
has sub-classes
Improper Check for Dropped Privileges c, Improper Validation of Integrity Check Value c, Incorrect Check of Function Return Value c, NULL Pointer Dereference c, Unchecked Error Condition c, Unchecked Return Value c, Unexpected Status Code or Return Value c

Improper Check or Handling of Exceptional Conditionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-703

has super-classes
Weakness c
has sub-classes
Declaration of Throws for Generic Exception c, Improper Check for Unusual or Exceptional Conditions c, Improper Handling of Additional Special Element c, Improper Handling of Exceptional Conditions c, Improper Handling of Inconsistent Special Elements c, Improper Handling of Insufficient Entropy in TRNG c, Improper Handling of Missing Special Element c, Improper Handling of Physical or Environmental Conditions c, Improper Handling of Syntactically Invalid Structure c, Missing Report of Error Condition c, Return of Wrong Status Code c, Uncaught Exception c

Improper Cleanup on Thrown Exceptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-460

has super-classes
Improper Handling of Exceptional Conditions c, Incomplete Cleanup c

Improper Clearing of Heap Memory Before Release ('Heap Inspection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-244

has super-classes
Sensitive Information in Resource Not Removed Before Reuse c

Improper Control of a Resource Through its Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-664

has super-classes
Weakness c
has sub-classes
Asymmetric Resource Consumption (Amplification) c, Creation of Emergent Resource c, Exposure of Resource to Wrong Sphere c, External Influence of Sphere Definition c, Externally Controlled Reference to a Resource in Another Sphere c, Improper Control of Dynamically-Managed Code Resources c, Improper Initialization c, Improper Preservation of Consistency Between Independent Representations of Shared State c, Improper Resource Shutdown or Release c, Improper Synchronization c, Improper Update of Reference Count c, Incomplete Internal State Distinction c, Incorrect Access of Indexable Resource ('Range Error') c, Incorrect Resource Transfer Between Spheres c, Incorrect Type Conversion or Cast c, Information Loss or Omission c, Insecure Storage of Sensitive Information c, Insufficient Resource Pool c, Modification of Assumed-Immutable Data (MAID) c, Operation on Resource in Wrong Phase of Lifetime c, Private Data Structure Returned From A Public Method c, Public Data Assigned to Private Array-Typed Field c, Reliance on Component That is Not Updateable c, Reliance on Package-level Scope c, Trust Boundary Violation c, Uncontrolled Resource Consumption c, Use of Incorrectly-Resolved Name or Reference c, clone() Method Without super.clone() c

Improper Control of Document Type Definitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-827

has super-classes
Inclusion of Functionality from Untrusted Control Sphere c, Use of Incorrectly-Resolved Name or Reference c

Improper Control of Dynamically-Identified Variablesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-914

has super-classes
Improper Control of Dynamically-Managed Code Resources c, Improper Control of Resource Identifiers ('Resource Injection') c
has sub-classes
Dynamic Variable Evaluation c, Variable Extraction Error c

Improper Control of Dynamically-Managed Code Resourcesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-913

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Deserialization of Untrusted Data c, Improper Control of Dynamically-Identified Variables c, Improper Control of Generation of Code ('Code Injection') c, Improperly Controlled Modification of Dynamically-Determined Object Attributes c, Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') c

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-98

has super-classes
Inclusion of Functionality from Untrusted Control Sphere c, Use of Incorrectly-Resolved Name or Reference c

Improper Control of Generation of Code ('Code Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-94

has super-classes
Improper Control of Dynamically-Managed Code Resources c, Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') c, Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') c, Improper Neutralization of Special Elements Used in a Template Engine c
is also defined as
named individual

Improper Control of Interaction Frequencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-799

has super-classes
Insufficient Control Flow Management c
has sub-classes
Improper Enforcement of a Single, Unique Action c, Improper Restriction of Excessive Authentication Attempts c

Improper Control of Resource Identifiers ('Resource Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-99

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Control of Dynamically-Identified Variables c, Improper Restriction of Names for Files and Other Resources c, Use of Multiple Resources with Duplicate Identifier c

Improper Encoding or Escaping of Outputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-116

has super-classes
Improper Neutralization c
has sub-classes
Improper Neutralization of HTTP Headers for Scripting Syntax c, Improper Output Neutralization for Logs c, Inappropriate Encoding for Output Context c

Improper Enforcement of a Single, Unique Actionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-837

has super-classes
Improper Control of Interaction Frequency c

Improper Enforcement of Behavioral Workflowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-841

has super-classes
Insufficient Control Flow Management c

Improper Enforcement of Message Integrity During Transmission in a Communication Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-924

has super-classes
Insufficient Verification of Data Authenticity c

Improper Export of Android Application Componentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-926

has super-classes
Improper Authorization c

Improper Filtering of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-790

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Incomplete Filtering of Special Elements c

Improper Finite State Machines (FSMs) in Hardware Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1245

has super-classes
Incorrect Provision of Specified Functionality c

Improper Following of a Certificate's Chain of Trustc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-296

has super-classes
Improper Certificate Validation c, Improper Following of Specification by Caller c

Improper Following of Specification by Callerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-573

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Creation of chroot Jail Without Changing Working Directory c, EJB Bad Practices: Use of Class Loader c, EJB Bad Practices: Use of Sockets c, Function Call with Incorrectly Specified Arguments c, Generation of Predictable IV with CBC Mode c, Improper Following of a Certificate's Chain of Trust c, Improperly Implemented Security Check for Standard c, Incorrect Check of Function Return Value c, J2EE Bad Practices: Non-serializable Object Stored in Session c, Missing Critical Step in Authentication c, Missing Cryptographic Step c, Multiple Operations on Resource in Single-Operation Context c, Object Model Violation: Just One of Equals and Hashcode Defined c, Struts: Form Bean Does Not Extend Validation Class c, Struts: Incomplete validate() Method Definition c, Undefined Behavior for Input to API c, Use of Low-Level Functionality c, Use of Multiple Resources with Duplicate Identifier c, clone() Method Without super.clone() c, finalize() Method Without super.finalize() c

Improper Handling of Additional Special Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-167

has super-classes
Improper Check or Handling of Exceptional Conditions c, Improper Handling of Invalid Use of Special Elements c

Improper Handling of Alternate Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-173

has super-classes
Encoding Error c

Improper Handling of Apple HFS+ Alternate Data Stream Pathc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-72

has super-classes
Improper Handling of File Names that Identify Virtual Resources c

Improper Handling of Case Sensitivityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-178

has super-classes
Use of Incorrectly-Resolved Name or Reference c

Improper Handling of Exceptional Conditionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-755

has super-classes
Improper Check or Handling of Exceptional Conditions c
has sub-classes
Declaration of Catch for Generic Exception c, Detection of Error Condition Without Action c, Generation of Error Message Containing Sensitive Information c, Improper Cleanup on Thrown Exception c, Improper Handling of Insufficient Permissions or Privileges c, Improper Handling of Insufficient Privileges c, Missing Custom Error Page c, Missing Standardized Error Handling Mechanism c, Not Failing Securely ('Failing Open') c, Use of NullPointerException Catch to Detect NULL Pointer Dereference c

Improper Handling of Extra Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-235

has super-classes
Improper Handling of Parameters c

Improper Handling of Extra Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-231

has super-classes
Improper Handling of Values c

Improper Handling of Faults that Lead to Instruction Skipsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1332

has super-classes
Improper Handling of Physical or Environmental Conditions c

Improper Handling of File Names that Identify Virtual Resourcesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-66

has super-classes
Use of Incorrectly-Resolved Name or Reference c
has sub-classes
Improper Handling of Apple HFS+ Alternate Data Stream Path c, Improper Handling of Windows ::DATA Alternate Data Stream c, Improper Handling of Windows Device Names c

Improper Handling of Hardware Behavior in Exceptionally Cold Environmentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1351

has super-classes
Improper Handling of Physical or Environmental Conditions c

Improper Handling of Highly Compressed Data (Data Amplification)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-409

has super-classes
Asymmetric Resource Consumption (Amplification) c

Improper Handling of Incomplete Structural Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-238

has super-classes
Improper Handling of Structural Elements c

Improper Handling of Inconsistent Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-168

has super-classes
Improper Check or Handling of Exceptional Conditions c, Improper Handling of Invalid Use of Special Elements c

Improper Handling of Inconsistent Structural Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-240

has super-classes
Improper Handling of Structural Elements c, Improper Neutralization c
has sub-classes
Improper Handling of Length Parameter Inconsistency c

Improper Handling of Insufficient Entropy in TRNGc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-333

has super-classes
Improper Check or Handling of Exceptional Conditions c, Insufficient Entropy c

Improper Handling of Insufficient Permissions or Privilegesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-280

has super-classes
Improper Handling of Exceptional Conditions c

Improper Handling of Insufficient Privilegesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-274

has super-classes
Improper Handling of Exceptional Conditions c, Improper Privilege Management c

Improper Handling of Invalid Use of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-159

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Improper Handling of Additional Special Element c, Improper Handling of Inconsistent Special Elements c, Improper Handling of Missing Special Element c

Improper Handling of Length Parameter Inconsistencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-130

has super-classes
Improper Handling of Inconsistent Structural Elements c

Improper Handling of Missing Special Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-166

has super-classes
Improper Check or Handling of Exceptional Conditions c, Improper Handling of Invalid Use of Special Elements c

Improper Handling of Missing Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-230

has super-classes
Improper Handling of Values c

Improper Handling of Mixed Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-175

has super-classes
Encoding Error c

Improper Handling of Overlap Between Protected Memory Rangesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1260

has super-classes
Improper Access Control c

Improper Handling of Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-233

has super-classes
Improper Handling of Syntactically Invalid Structure c
has sub-classes
Failure to Handle Missing Parameter c, Improper Handling of Extra Parameters c, Improper Handling of Undefined Parameters c

Improper Handling of Physical or Environmental Conditionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1384

has super-classes
Improper Check or Handling of Exceptional Conditions c
has sub-classes
Improper Handling of Faults that Lead to Instruction Skips c, Improper Handling of Hardware Behavior in Exceptionally Cold Environments c, Improper Handling of Single Event Upsets c, Improper Protection Against Voltage and Clock Glitches c

Improper Handling of Single Event Upsetsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1261

has super-classes
Improper Handling of Physical or Environmental Conditions c

Improper Handling of Structural Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-237

has super-classes
Improper Handling of Syntactically Invalid Structure c
has sub-classes
Failure to Handle Incomplete Element c, Improper Handling of Incomplete Structural Elements c, Improper Handling of Inconsistent Structural Elements c

Improper Handling of Syntactically Invalid Structurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-228

has super-classes
Improper Check or Handling of Exceptional Conditions c, Improper Neutralization c
has sub-classes
Improper Handling of Parameters c, Improper Handling of Structural Elements c, Improper Handling of Unexpected Data Type c, Improper Handling of Values c

Improper Handling of Undefined Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-236

has super-classes
Improper Handling of Parameters c

Improper Handling of Undefined Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-232

has super-classes
Improper Handling of Values c

Improper Handling of Unexpected Data Typec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-241

has super-classes
Improper Handling of Syntactically Invalid Structure c

Improper Handling of Unicode Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-176

has super-classes
Encoding Error c

Improper Handling of URL Encoding (Hex Encoding)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-177

has super-classes
Encoding Error c

Improper Handling of Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-229

has super-classes
Improper Handling of Syntactically Invalid Structure c
has sub-classes
Improper Handling of Extra Values c, Improper Handling of Missing Values c, Improper Handling of Undefined Values c

Improper Handling of Windows ::DATA Alternate Data Streamc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-69

has super-classes
Improper Handling of File Names that Identify Virtual Resources c

Improper Handling of Windows Device Namesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-67

has super-classes
Improper Handling of File Names that Identify Virtual Resources c

Improper Initializationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-665

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Allocation of Resources Without Limits or Throttling c, Cryptographic Operations are run Before Supporting Units are Ready c, Excessive Use of Hard-Coded Literals in Initialization c, External Initialization of Trusted Variables or Data Stores c, Incorrect Register Defaults or Module Parameters c, Initialization with Hard-Coded Network Resource Configuration Data c, Insecure Default Initialization of Resource c, Missing Initialization of Resource c, Non-exit on Failed Initialization c, Use of Uninitialized Resource c

Improper Input Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-20

has super-classes
Improper Neutralization c
has sub-classes
Improper Use of Validation Framework c, Improper Validation of Consistency within Input c, Improper Validation of Function Hook Arguments c, Improper Validation of Specified Index, Position, or Offset in Input c, Improper Validation of Specified Quantity in Input c, Improper Validation of Specified Type of Input c, Improper Validation of Syntactic Correctness of Input c, Improper Validation of Unsafe Equivalence in Input c, Incorrect Behavior Order: Early Validation c
is also defined as
named individual

Improper Interaction Between Multiple Correctly-Behaving Entitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-435

has super-classes
Weakness c
has sub-classes
Behavioral Change in New Version or Environment c, Insecure Automated Optimizations c, Interpretation Conflict c, Reliance on Data/Memory Layout c

Improper Isolation of Shared Resources in Network On Chip (NoC)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1331

has super-classes
Exposure of Resource to Wrong Sphere c, Improper Isolation or Compartmentalization c

Improper Isolation of Shared Resources on System-on-a-Chip (SoC)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1189

has super-classes
Exposure of Resource to Wrong Sphere c, Improper Isolation or Compartmentalization c
has sub-classes
Non-Transparent Sharing of Microarchitectural Resources c

Improper Isolation or Compartmentalizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-653

has super-classes
Protection Mechanism Failure c, Violation of Secure Design Principles c
has sub-classes
Improper Isolation of Shared Resources in Network On Chip (NoC) c, Improper Isolation of Shared Resources on System-on-a-Chip (SoC) c

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-22

has super-classes
Exposure of Resource to Wrong Sphere c, Use of Incorrectly-Resolved Name or Reference c
has sub-classes
Absolute Path Traversal c, Relative Path Traversal c
is also defined as
named individual

Improper Link Resolution Before File Access ('Link Following')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-59

has super-classes
Use of Incorrectly-Resolved Name or Reference c
has sub-classes
Insecure Operation on Windows Junction / Mount Point c, UNIX Hard Link c, UNIX Symbolic Link (Symlink) Following c, Windows Hard Link c, Windows Shortcut Following (.LNK) c

Improper Lock Behavior After Power State Transitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1232

has super-classes
Improper Locking c

Improper Lockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-667

has super-classes
Improper Synchronization c
has sub-classes
Deadlock c, Double-Checked Locking c, Hardware Internal or Debug Modes Allow Override of Locks c, Improper Lock Behavior After Power State Transition c, Improper Resource Locking c, Missing Lock Check c, Multiple Locks of a Critical Resource c, Multiple Unlocks of a Critical Resource c, Security-Sensitive Hardware Controls with Missing Lock Bit Protection c, Unlock of a Resource that is not Locked c, Unrestricted Externally Accessible Lock c

Improper Management of Sensitive Trace Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1323

has super-classes
Improper Access Control c

Improper Neutralizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-707

has super-classes
Weakness c
has sub-classes
Deletion of Data Structure Sentinel c, Encoding Error c, Improper Encoding or Escaping of Output c, Improper Handling of Inconsistent Structural Elements c, Improper Handling of Syntactically Invalid Structure c, Improper Input Validation c, Improper Neutralization of Special Elements c, Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c, Improper Null Termination c

Improper Neutralization of Alternate XSS Syntaxc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-87

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-88

has super-classes
Improper Neutralization of Special Elements used in a Command ('Command Injection') c

Improper Neutralization of Comment Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-151

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of CRLF Sequences ('CRLF Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-93

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') c

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-113

has super-classes
Improper Neutralization of CRLF Sequences ('CRLF Injection') c, Interpretation Conflict c

Improper Neutralization of Data within XPath Expressions ('XPath Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-643

has super-classes
Improper Neutralization of Special Elements in Data Query Logic c, XML Injection (aka Blind XPath Injection) c

Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-652

has super-classes
Improper Neutralization of Special Elements in Data Query Logic c, XML Injection (aka Blind XPath Injection) c

Improper Neutralization of Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-140

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Improper Neutralization of Expression/Command Delimiters c, Improper Neutralization of Line Delimiters c, Improper Neutralization of Parameter/Argument Delimiters c, Improper Neutralization of Record Delimiters c, Improper Neutralization of Section Delimiters c, Improper Neutralization of Value Delimiters c

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-95

has super-classes
Improper Control of Generation of Code ('Code Injection') c

Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-96

has super-classes
Improper Control of Generation of Code ('Code Injection') c
has sub-classes
Improper Neutralization of Server-Side Includes (SSI) Within a Web Page c

Improper Neutralization of Encoded URI Schemes in a Web Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-84

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Improper Neutralization of Equivalent Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-76

has super-classes
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) c

Improper Neutralization of Escape, Meta, or Control Sequencesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-150

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Expression/Command Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-146

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Formula Elements in a CSV Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1236

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c

Improper Neutralization of HTTP Headers for Scripting Syntaxc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-644

has super-classes
Improper Encoding or Escaping of Output c

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-79

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Doubled Character XSS Manipulations c, Improper Neutralization of Alternate XSS Syntax c, Improper Neutralization of Encoded URI Schemes in a Web Page c, Improper Neutralization of Invalid Characters in Identifiers in Web Pages c, Improper Neutralization of Script in Attributes in a Web Page c, Improper Neutralization of Script in an Error Message Web Page c, Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) c, Incomplete Denylist to Cross-Site Scripting c
is also defined as
named individual

Improper Neutralization of Input Leadersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-148

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Input Terminatorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-147

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Null Byte Interaction Error (Poison Null Byte) c

Improper Neutralization of Internal Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-164

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Improper Neutralization of Multiple Internal Special Elements c

Improper Neutralization of Invalid Characters in Identifiers in Web Pagesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-86

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c, Interpretation Conflict c

Improper Neutralization of Leading Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-160

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Improper Neutralization of Multiple Leading Special Elements c, Path Traversal: '/absolute/pathname/here' c

Improper Neutralization of Line Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-144

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Macro Symbolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-152

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Multiple Internal Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-165

has super-classes
Improper Neutralization of Internal Special Elements c
has sub-classes
Path Equivalence: '\multiple\\internal\backslash' c, Path Equivalence: 'file...name' (Multiple Internal Dot) c

Improper Neutralization of Multiple Leading Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-161

has super-classes
Improper Neutralization of Leading Special Elements c
has sub-classes
Path Equivalence: '//multiple/leading/slash' c

Improper Neutralization of Multiple Trailing Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-163

has super-classes
Improper Neutralization of Trailing Special Elements c
has sub-classes
Path Equivalence: '/multiple/trailing/slash//' c, Path Equivalence: 'filename....' (Multiple Trailing Dot) c

Improper Neutralization of Null Byte or NUL Characterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-158

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Parameter/Argument Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-141

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Quoting Syntaxc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-149

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Record Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-143

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Script in an Error Message Web Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-81

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Improper Neutralization of Script in Attributes in a Web Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-83

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c
has sub-classes
Improper Neutralization of Script in Attributes of IMG Tags in a Web Page c

Improper Neutralization of Script in Attributes of IMG Tags in a Web Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-82

has super-classes
Improper Neutralization of Script in Attributes in a Web Page c

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-80

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Improper Neutralization of Section Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-145

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Server-Side Includes (SSI) Within a Web Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-97

has super-classes
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') c

Improper Neutralization of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-138

has super-classes
Improper Neutralization c
has sub-classes
Addition of Data Structure Sentinel c, Failure to Sanitize Paired Delimiters c, Improper Filtering of Special Elements c, Improper Handling of Invalid Use of Special Elements c, Improper Neutralization of Comment Delimiters c, Improper Neutralization of Delimiters c, Improper Neutralization of Escape, Meta, or Control Sequences c, Improper Neutralization of Input Leaders c, Improper Neutralization of Input Terminators c, Improper Neutralization of Internal Special Elements c, Improper Neutralization of Leading Special Elements c, Improper Neutralization of Macro Symbols c, Improper Neutralization of Null Byte or NUL Character c, Improper Neutralization of Quoting Syntax c, Improper Neutralization of Substitution Characters c, Improper Neutralization of Trailing Special Elements c, Improper Neutralization of Variable Name Delimiters c, Improper Neutralization of Whitespace c, Improper Neutralization of Wildcards or Matching Symbols c

Improper Neutralization of Special Elements in Data Query Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-943

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Neutralization of Data within XPath Expressions ('XPath Injection') c, Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') c, Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') c, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') c

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-74

has super-classes
Improper Neutralization c
has sub-classes
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) c, Improper Control of Generation of Code ('Code Injection') c, Improper Control of Resource Identifiers ('Resource Injection') c, Improper Neutralization of CRLF Sequences ('CRLF Injection') c, Improper Neutralization of Formula Elements in a CSV File c, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c, Improper Neutralization of Special Elements in Data Query Logic c, Improper Neutralization of Special Elements used in a Command ('Command Injection') c, XML Injection (aka Blind XPath Injection) c

Improper Neutralization of Special Elements used in a Command ('Command Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-77

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Executable Regular Expression Error c, Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') c, Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') c, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') c
is also defined as
named individual

Improper Neutralization of Special Elements Used in a Template Enginec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1336

has super-classes
Improper Control of Generation of Code ('Code Injection') c

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-917

has super-classes
Improper Neutralization of Special Elements used in a Command ('Command Injection') c

Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-90

has super-classes
Improper Neutralization of Special Elements in Data Query Logic c

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-78

has super-classes
Improper Neutralization of Special Elements used in a Command ('Command Injection') c
is also defined as
named individual

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-89

has super-classes
Improper Neutralization of Special Elements in Data Query Logic c
has sub-classes
SQL Injection: Hibernate c
is also defined as
named individual

Improper Neutralization of Substitution Charactersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-153

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Trailing Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-162

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Improper Neutralization of Multiple Trailing Special Elements c, Path Equivalence: 'filedir\' (Trailing Backslash) c, Path Equivalence: 'filename ' (Trailing Space) c, Path Equivalence: 'filename.' (Trailing Dot) c, Path Equivalence: 'filename/' (Trailing Slash) c

Improper Neutralization of Value Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-142

has super-classes
Improper Neutralization of Delimiters c

Improper Neutralization of Variable Name Delimitersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-154

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Whitespacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-156

has super-classes
Improper Neutralization of Special Elements c

Improper Neutralization of Wildcards or Matching Symbolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-155

has super-classes
Improper Neutralization of Special Elements c
has sub-classes
Path Equivalence: 'filedir*' (Wildcard) c

Improper Null Terminationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-170

has super-classes
Improper Neutralization c

Improper Output Neutralization for Logsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-117

has super-classes
Improper Encoding or Escaping of Output c

Improper Ownership Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-282

has super-classes
Improper Access Control c
has sub-classes
Incorrect Ownership Assignment c, Unverified Ownership c

Improper Physical Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1263

has super-classes
Improper Access Control c
has sub-classes
Sensitive Non-Volatile Information Not Protected During Debug c

Improper Preservation of Consistency Between Independent Representations of Shared Statec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1250

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Application-Level Admin Tool with Inconsistent View of Underlying Operating System c, Mirrored Regions with Different Values c

Improper Preservation of Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-281

has super-classes
Incorrect Permission Assignment for Critical Resource c

Improper Prevention of Lock Bit Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1231

has super-classes
Improper Access Control c

Improper Privilege Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-269

has super-classes
Improper Access Control c
has sub-classes
Execution with Unnecessary Privileges c, Improper Handling of Insufficient Privileges c, Incorrect Privilege Assignment c, Incorrect Use of Privileged APIs c, Privilege Chaining c, Privilege Context Switching Error c, Privilege Defined With Unsafe Actions c, Privilege Dropping / Lowering Errors c

Improper Protection against Electromagnetic Fault Injection (EM-FI)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1319

has super-classes
Protection Mechanism Failure c

Improper Protection Against Voltage and Clock Glitchesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1247

has super-classes
Improper Handling of Physical or Environmental Conditions c

Improper Protection for Outbound Error Messages and Alert Signalsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1320

has super-classes
Improper Access Control c

Improper Protection of Alternate Pathc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-424

has super-classes
Not Using Complete Mediation c, Protection Mechanism Failure c
has sub-classes
Direct Request ('Forced Browsing') c

Improper Protection of Physical Side Channelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1300

has super-classes
Observable Discrepancy c
has sub-classes
Comparison Logic is Vulnerable to Power Side-Channel Attacks c

Improper Protections Against Hardware Overheatingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1338

has super-classes
Protection Mechanism Failure c

Improper Removal of Sensitive Information Before Storage or Transferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-212

has super-classes
Incorrect Resource Transfer Between Spheres c
has sub-classes
Exposure of Sensitive System Information Due to Uncleared Debug Information c, Sensitive Information in Resource Not Removed Before Reuse c

Improper Resolution of Path Equivalencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-41

has super-classes
Use of Incorrectly-Resolved Name or Reference c
has sub-classes
Path Equivalence: ' filename' (Leading Space) c, Path Equivalence: '/./' (Single Dot Directory) c, Path Equivalence: '//multiple/leading/slash' c, Path Equivalence: '/multiple//internal/slash' c, Path Equivalence: '/multiple/trailing/slash//' c, Path Equivalence: '\multiple\\internal\backslash' c, Path Equivalence: 'fakedir/../realdir/filename' c, Path Equivalence: 'file name' (Internal Whitespace) c, Path Equivalence: 'file.name' (Internal Dot) c, Path Equivalence: 'filedir*' (Wildcard) c, Path Equivalence: 'filedir\' (Trailing Backslash) c, Path Equivalence: 'filename ' (Trailing Space) c, Path Equivalence: 'filename.' (Trailing Dot) c, Path Equivalence: 'filename/' (Trailing Slash) c, Path Equivalence: Windows 8.3 Filename c

Improper Resource Lockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-413

has super-classes
Improper Locking c
has sub-classes
Sensitive Data Storage in Improperly Locked Memory c

Improper Resource Shutdown or Releasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-404

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Improper Check for Certificate Revocation c, Improper Scrubbing of Sensitive Data from Decommissioned Device c, Incomplete Cleanup c, Missing Release of Resource after Effective Lifetime c, Release of Invalid Pointer or Reference c

Improper Restriction of Communication Channel to Intended Endpointsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-923

has super-classes
Improper Access Control c
has sub-classes
Channel Accessible by Non-Endpoint c, Improper Validation of Certificate with Host Mismatch c, Improper Verification of Source of a Communication Channel c, Incorrectly Specified Destination in a Communication Channel c, Permissive Cross-domain Policy with Untrusted Domains c, Reliance on IP Address for Authentication c, Sensitive Cookie with Improper SameSite Attribute c, Unprotected Alternate Channel c, Unprotected Primary Channel c

Improper Restriction of Excessive Authentication Attemptsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-307

has super-classes
Improper Control of Interaction Frequency c, Weak Authentication c

Improper Restriction of Names for Files and Other Resourcesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-641

has super-classes
Improper Control of Resource Identifiers ('Resource Injection') c

Improper Restriction of Operations within the Bounds of a Memory Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-119

has super-classes
Incorrect Access of Indexable Resource ('Range Error') c
has sub-classes
Access of Memory Location After End of Buffer c, Access of Memory Location Before Start of Buffer c, Access of Uninitialized Pointer c, Buffer Access with Incorrect Length Value c, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') c, Expired Pointer Dereference c, Integer Overflow to Buffer Overflow c, Out-of-bounds Read c, Out-of-bounds Write c, Return of Pointer Value Outside of Expected Range c, Untrusted Pointer Dereference c, Use of Out-of-range Pointer Offset c
is also defined as
named individual

Improper Restriction of Power Consumptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-920

has super-classes
Uncontrolled Resource Consumption c

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-776

has super-classes
Asymmetric Resource Consumption (Amplification) c, Uncontrolled Recursion c

Improper Restriction of Rendered UI Layers or Framesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1021

has super-classes
Unintended Proxy or Intermediary ('Confused Deputy') c, User Interface (UI) Misrepresentation of Critical Information c

Improper Restriction of Security Token Assignmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1259

has super-classes
Improper Access Control c

Improper Restriction of Software Interfaces to Hardware Featuresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1256

has super-classes
Improper Authorization c

Improper Restriction of Write-Once Bit Fieldsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1224

has super-classes
Improper Access Control c

Improper Restriction of XML External Entity Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-611

has super-classes
Externally Controlled Reference to a Resource in Another Sphere c
is also defined as
named individual

Improper Scrubbing of Sensitive Data from Decommissioned Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1266

has super-classes
Improper Resource Shutdown or Release c

Improper Setting of Bus Controlling Capability in Fabric End-pointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1315

has super-classes
Improper Access Control c

Improper Synchronizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-662

has super-classes
Improper Control of a Resource Through its Lifetime c, Insufficient Control Flow Management c
has sub-classes
Improper Locking c, Incorrect Synchronization c, Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element c, Missing Synchronization c, Use of a Non-reentrant Function in a Concurrent Context c

Improper Translation of Security Attributes by Fabric Bridgec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1311

has super-classes
Improper Access Control c

Improper Update of Reference Countc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-911

has super-classes
Improper Control of a Resource Through its Lifetime c

Improper Use of Validation Frameworkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1173

has super-classes
Improper Input Validation c
has sub-classes
ASP.NET Misconfiguration: Improper Model Validation c, ASP.NET Misconfiguration: Not Using Input Validation Framework c, Struts: Duplicate Validation Forms c, Struts: Form Field Without Validator c, Struts: Plug-in Framework not in Use c, Struts: Unvalidated Action Form c, Struts: Validator Turned Off c

Improper Validation of Array Indexc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-129

has super-classes
Improper Validation of Specified Index, Position, or Offset in Input c

Improper Validation of Certificate Expirationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-298

has super-classes
Improper Certificate Validation c, Operation on a Resource after Expiration or Release c

Improper Validation of Certificate with Host Mismatchc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-297

has super-classes
Improper Certificate Validation c, Improper Restriction of Communication Channel to Intended Endpoints c

Improper Validation of Consistency within Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1288

has super-classes
Improper Input Validation c

Improper Validation of Function Hook Argumentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-622

has super-classes
Improper Input Validation c

Improper Validation of Integrity Check Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-354

has super-classes
Improper Check for Unusual or Exceptional Conditions c, Insufficient Verification of Data Authenticity c

Improper Validation of Specified Index, Position, or Offset in Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1285

has super-classes
Improper Input Validation c
has sub-classes
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code c, Improper Validation of Array Index c

Improper Validation of Specified Quantity in Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1284

has super-classes
Improper Input Validation c
has sub-classes
Memory Allocation with Excessive Size Value c, Unchecked Input for Loop Condition c

Improper Validation of Specified Type of Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1287

has super-classes
Improper Input Validation c

Improper Validation of Syntactic Correctness of Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1286

has super-classes
Improper Input Validation c
has sub-classes
Missing XML Validation c

Improper Validation of Unsafe Equivalence in Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1289

has super-classes
Improper Input Validation c

Improper Verification of Cryptographic Signaturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-347

has super-classes
Insufficient Verification of Data Authenticity c

Improper Verification of Intent by Broadcast Receiverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-925

has super-classes
Improper Verification of Source of a Communication Channel c

Improper Verification of Source of a Communication Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-940

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c
has sub-classes
Improper Verification of Intent by Broadcast Receiver c

Improper Write Handling in Limited-write Non-Volatile Memoriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1246

has super-classes
Uncontrolled Resource Consumption c

Improper Zeroization of Hardware Registerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1239

has super-classes
Sensitive Information in Resource Not Removed Before Reuse c

Improperly Controlled Modification of Dynamically-Determined Object Attributesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-915

has super-classes
Improper Control of Dynamically-Managed Code Resources c
has sub-classes
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') c

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1321

has super-classes
Improperly Controlled Modification of Dynamically-Determined Object Attributes c

Improperly Controlled Sequential Memory Allocationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1325

has super-classes
Allocation of Resources Without Limits or Throttling c

Improperly Implemented Security Check for Standardc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-358

has super-classes
Improper Following of Specification by Caller c, Protection Mechanism Failure c

Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1304

has super-classes
Improper Access Control c

In-memory Password Storec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#In-memoryPasswordStore

has super-classes
Password Store c
is also defined as
named individual

Inaccurate Commentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1116

has super-classes
Inappropriate Source Code Style or Formatting c

Inadequate Encryption Strengthc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-326

has super-classes
Protection Mechanism Failure c
has sub-classes
Use of Weak Hash c

Inappropriate Comment Stylec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1113

has super-classes
Inappropriate Source Code Style or Formatting c

Inappropriate Encoding for Output Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-838

has super-classes
Improper Encoding or Escaping of Output c

Inappropriate Source Code Style or Formattingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1078

has super-classes
Insufficient Adherence to Expected Conventions c
has sub-classes
Callable with Insufficient Behavioral Summary c, Inaccurate Comments c, Inappropriate Comment Style c, Inappropriate Whitespace Style c, Inconsistent Naming Conventions for Identifiers c, Insufficient Isolation of Symbolic Constant Definitions c, Insufficient Use of Symbolic Constants c, Invokable Control Element with Excessive Volume of Commented-out Code c, Source Code Element without Standard Prologue c, Suspicious Comment c, Use of Hard-coded, Security-relevant Constants c, Use of Same Variable for Multiple Purposes c

Inappropriate Whitespace Stylec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1114

has super-classes
Inappropriate Source Code Style or Formatting c

Inbound Internet DNS Response Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundInternetDNSResponseTraffic

has super-classes
Inbound Internet Network Traffic c
is also defined as
named individual

Inbound Internet Mail Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundInternetMailTraffic

has super-classes
Inbound Internet Network Traffic c, Inbound Network Traffic c, Mail Network Traffic c
is also defined as
named individual

Inbound Internet Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundInternetNetworkTraffic

has super-classes
Inbound Network Traffic c, Internet Network Traffic c
has sub-classes
Inbound Internet DNS Response Traffic c, Inbound Internet Mail Traffic c
is also defined as
named individual

Inbound Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Inbound Internet Mail Traffic c, Inbound Internet Network Traffic c
is also defined as
named individual

Inbound Session Volume Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundSessionVolumeAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Inbound Traffic Filteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InboundTrafficFiltering

has super-classes
Network Traffic Filtering c
has sub-classes
Email Filtering c
has members
Email Filtering ni
is also defined as
named individual

Incidentc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Incident

A ticket or a case associated with a cybersecurity incident.
has super-classes
Actionable Item c

Incident Statusc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/IncidentStatus

Normalized status of an Incident
has super-classes
Mekanoid Thing c
has members
Closed ni, Open ni, Unknown ni

Inclusion of Functionality from Untrusted Control Spherec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-829

has super-classes
Incorrect Resource Transfer Between Spheres c
has sub-classes
Improper Control of Document Type Definition c, Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') c, Inclusion of Web Functionality from an Untrusted Source c

Inclusion of Sensitive Information in an Include Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-541

has super-classes
Inclusion of Sensitive Information in Source Code c

Inclusion of Sensitive Information in Source Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-540

has super-classes
Insertion of Sensitive Information into Externally-Accessible File or Directory c
has sub-classes
Inclusion of Sensitive Information in Source Code Comments c, Inclusion of Sensitive Information in Test Code c, Inclusion of Sensitive Information in an Include File c

Inclusion of Sensitive Information in Source Code Commentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-615

has super-classes
Inclusion of Sensitive Information in Source Code c

Inclusion of Sensitive Information in Test Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-531

has super-classes
Inclusion of Sensitive Information in Source Code c

Inclusion of Undocumented Features or Chicken Bitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1242

has super-classes
Improper Access Control c

Inclusion of Web Functionality from an Untrusted Sourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-830

has super-classes
Inclusion of Functionality from Untrusted Control Sphere c

Incomplete Cleanupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-459

has super-classes
Improper Resource Shutdown or Release c
has sub-classes
Improper Cleanup on Thrown Exception c, Sensitive Information in Resource Not Removed Before Reuse c, finalize() Method Without super.finalize() c

Incomplete Comparison with Missing Factorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1023

has super-classes
Incorrect Comparison c
has sub-classes
Incomplete List of Disallowed Inputs c, Missing Default Case in Multiple Condition Expression c, Numeric Range Comparison Without Minimum Check c, Partial String Comparison c

Incomplete Denylist to Cross-Site Scriptingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-692

has super-classes
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') c

Incomplete Design Documentationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1110

has super-classes
Insufficient Technical Documentation c

Incomplete Documentation of Program Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1112

has super-classes
Insufficient Technical Documentation c

Incomplete Filtering of Multiple Instances of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-794

has super-classes
Incomplete Filtering of One or More Instances of Special Elements c

Incomplete Filtering of One or More Instances of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-792

has super-classes
Incomplete Filtering of Special Elements c
has sub-classes
Incomplete Filtering of Multiple Instances of Special Elements c, Only Filtering One Instance of a Special Element c

Incomplete Filtering of Special Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-791

has super-classes
Improper Filtering of Special Elements c
has sub-classes
Incomplete Filtering of One or More Instances of Special Elements c, Only Filtering Special Elements at a Specified Location c

Incomplete I/O Documentationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1111

has super-classes
Insufficient Technical Documentation c

Incomplete Identification of Uploaded File Variables (PHP)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-616

has super-classes
Insufficient Verification of Data Authenticity c

Incomplete Internal State Distinctionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-372

has super-classes
Improper Control of a Resource Through its Lifetime c

Incomplete List of Disallowed Inputsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-184

has super-classes
Incomplete Comparison with Missing Factors c, Protection Mechanism Failure c

Incomplete Model of Endpoint Featuresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-437

has super-classes
Interpretation Conflict c

Inconsistency Between Implementation and Documented Designc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1068

has super-classes
Improper Adherence to Coding Standards c

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-444

has super-classes
Interpretation Conflict c

Inconsistent Naming Conventions for Identifiersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1099

has super-classes
Inappropriate Source Code Style or Formatting c

Incorrect Access of Indexable Resource ('Range Error')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-118

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Incorrect Authorizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-863

has super-classes
Improper Authorization c
has sub-classes
Authorization Bypass Through User-Controlled Key c, Guessable CAPTCHA c, Incorrect Behavior Order: Authorization Before Parsing and Canonicalization c, Internal Asset Exposed to Unsafe Debug Access Level or State c, Use of Non-Canonical URL Paths for Authorization Decisions c

Incorrect Behavior Orderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-696

has super-classes
Insufficient Control Flow Management c
has sub-classes
Access Control Check Implemented After Asset is Accessed c, DMA Device Enabled Too Early in Boot Phase c, Incorrect Behavior Order: Authorization Before Parsing and Canonicalization c, Incorrect Behavior Order: Early Amplification c, Incorrect Behavior Order: Early Validation c, Power-On of Untrusted Execution Core Before Enabling Fabric Access Control c

Incorrect Behavior Order: Authorization Before Parsing and Canonicalizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-551

has super-classes
Incorrect Authorization c, Incorrect Behavior Order c

Incorrect Behavior Order: Early Amplificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-408

has super-classes
Asymmetric Resource Consumption (Amplification) c, Incorrect Behavior Order c

Incorrect Behavior Order: Early Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-179

has super-classes
Improper Input Validation c, Incorrect Behavior Order c
has sub-classes
Incorrect Behavior Order: Validate Before Canonicalize c, Incorrect Behavior Order: Validate Before Filter c

Incorrect Behavior Order: Validate Before Canonicalizec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-180

has super-classes
Incorrect Behavior Order: Early Validation c

Incorrect Behavior Order: Validate Before Filterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-181

has super-classes
Incorrect Behavior Order: Early Validation c

Incorrect Bitwise Shift of Integerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1335

has super-classes
Incorrect Calculation c

Incorrect Block Delimitationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-483

has super-classes
Always-Incorrect Control Flow Implementation c

Incorrect Calculationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-682

has super-classes
Weakness c
has sub-classes
Divide By Zero c, Incorrect Bitwise Shift of Integer c, Incorrect Calculation of Buffer Size c, Incorrect Calculation of Multi-Byte String Length c, Incorrect Pointer Scaling c, Insufficient Precision or Accuracy of a Real Number c, Integer Overflow or Wraparound c, Integer Underflow (Wrap or Wraparound) c, Off-by-one Error c, Use of Pointer Subtraction to Determine Size c, Wrap-around Error c

Incorrect Calculation of Buffer Sizec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-131

has super-classes
Incorrect Calculation c
has sub-classes
Use of sizeof() on a Pointer Type c

Incorrect Calculation of Multi-Byte String Lengthc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-135

has super-classes
Incorrect Calculation c

Incorrect Chaining or Granularity of Debug Componentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1296

has super-classes
Improper Access Control c

Incorrect Check of Function Return Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-253

has super-classes
Improper Check for Unusual or Exceptional Conditions c, Improper Following of Specification by Caller c

Incorrect Comparisonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-697

has super-classes
Weakness c
has sub-classes
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations c, Comparison Using Wrong Factors c, Comparison of Incompatible Types c, Floating Point Comparison with Incorrect Operator c, Incomplete Comparison with Missing Factors c, Incorrect Comparison Logic Granularity c, Incorrect Regular Expression c, Object Model Violation: Just One of Equals and Hashcode Defined c, Permissive List of Allowed Inputs c

Incorrect Comparison Logic Granularityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1254

has super-classes
Incorrect Comparison c, Observable Timing Discrepancy c

Incorrect Control Flow Scopingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-705

has super-classes
Insufficient Control Flow Management c
has sub-classes
Declaration of Catch for Generic Exception c, Declaration of Throws for Generic Exception c, Execution After Redirect (EAR) c, J2EE Bad Practices: Use of System.exit() c, Non-exit on Failed Initialization c, Return Inside Finally Block c, Uncaught Exception c, Use of NullPointerException Catch to Detect NULL Pointer Dereference c

Incorrect Conversion between Numeric Typesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-681

has super-classes
Incorrect Type Conversion or Cast c
has sub-classes
Integer Coercion Error c, Numeric Truncation Error c, Signed to Unsigned Conversion Error c, Unexpected Sign Extension c, Unsigned to Signed Conversion Error c

Incorrect Conversion of Security Identifiersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1292

has super-classes
Improper Access Control c

Incorrect Decoding of Security Identifiersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1290

has super-classes
Improper Access Control c

Incorrect Default Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-276

has super-classes
Incorrect Permission Assignment for Critical Resource c
is also defined as
named individual

Incorrect Execution-Assigned Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-279

has super-classes
Incorrect Permission Assignment for Critical Resource c

Incorrect Implementation of Authentication Algorithmc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-303

has super-classes
Weak Authentication c
has sub-classes
Missing Critical Step in Authentication c

Incorrect Ownership Assignmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-708

has super-classes
Improper Ownership Management c

Incorrect Parsing of Numbers with Different Radicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1389

has super-classes
Incorrect Type Conversion or Cast c

Incorrect Permission Assignment for Critical Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-732

has super-classes
Exposure of Resource to Wrong Sphere c, Improper Authorization c
has sub-classes
Improper Preservation of Permissions c, Incorrect Default Permissions c, Incorrect Execution-Assigned Permissions c, Insecure Inherited Permissions c, Insecure Preserved Inherited Permissions c, Sensitive Cookie Without 'HttpOnly' Flag c

Incorrect Pointer Scalingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-468

has super-classes
Incorrect Calculation c

Incorrect Privilege Assignmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-266

has super-classes
Improper Privilege Management c
has sub-classes
.NET Misconfiguration: Use of Impersonation c, ASP.NET Misconfiguration: Use of Identity Impersonation c, J2EE Misconfiguration: Weak Access Permissions for EJB Methods c, Use of Web Link to Untrusted Target with window.opener Access c

Incorrect Provision of Specified Functionalityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-684

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Expected Behavior Violation c, Hidden Functionality c, Improper Finite State Machines (FSMs) in Hardware Logic c, Missing Report of Error Condition c, Return of Wrong Status Code c, UI Discrepancy for Security Feature c, User Interface (UI) Misrepresentation of Critical Information c

Incorrect Register Defaults or Module Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1221

has super-classes
Improper Initialization c

Incorrect Regular Expressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-185

has super-classes
Incorrect Comparison c
has sub-classes
Overly Restrictive Regular Expression c, Permissive Regular Expression c

Incorrect Resource Transfer Between Spheresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-669

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Creation of chroot Jail Without Changing Working Directory c, Download of Code Without Integrity Check c, Improper Removal of Sensitive Information Before Storage or Transfer c, Inclusion of Functionality from Untrusted Control Sphere c, Unrestricted Upload of File with Dangerous Type c

Incorrect Selection of Fuse Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1253

has super-classes
Protection Mechanism Failure c

Incorrect Short Circuit Evaluationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-768

has super-classes
Insufficient Control Flow Management c

Incorrect Synchronizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-821

has super-classes
Improper Synchronization c
has sub-classes
Call to Thread run() instead of start() c, EJB Bad Practices: Use of Synchronization Primitives c, Hardware Logic with Insecure De-Synchronization between Control and Data Channels c, Synchronous Access of Remote Resource without Timeout c

Incorrect Type Conversion or Castc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-704

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Access of Resource Using Incompatible Type ('Type Confusion') c, Attempt to Access Child of a Non-structure Pointer c, Incorrect Conversion between Numeric Types c, Incorrect Parsing of Numbers with Different Radices c

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-335

has super-classes
Use of Insufficiently Random Values c
has sub-classes
Predictable Seed in Pseudo-Random Number Generator (PRNG) c, Same Seed in Pseudo-Random Number Generator (PRNG) c, Small Seed Space in PRNG c

Incorrect Use of Autoboxing and Unboxing for Performance Critical Operationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1235

has super-classes
Uncontrolled Resource Consumption c

Incorrect Use of Privileged APIsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-648

has super-classes
Improper Privilege Management c

Incorrect User Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-286

has super-classes
Improper Access Control c
has sub-classes
Placement of User into Incorrect Group c

Incorrectly Specified Destination in a Communication Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-941

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c

Indicator Blockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1054

has super-classes
Defense Evasion Technique c

Indicator Blockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.006

has super-classes
Impair Defenses c

Indicator Removal from Toolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.005

has super-classes
Obfuscated Files or Information c

Indicator Removal from Toolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1066

has super-classes
Defense Evasion Technique c

Indicator Removal on Hostc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070

has super-classes
Defense Evasion Technique c
has sub-classes
Clear Command History c, Clear Linux or Mac System Logs c, Clear Windows Event Logs c, File Deletion c, Network Share Connection Removal c, Timestomp c

Indirect Branch Call Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IndirectBranchCallAnalysis

has super-classes
Process Analysis c
is also defined as
named individual

Indirect Command Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1202

has super-classes
Defense Evasion Technique c

Inefficient Algorithmic Complexityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-407

has super-classes
Asymmetric Resource Consumption (Amplification) c
has sub-classes
Inefficient Regular Expression Complexity c

Inefficient CPU Computationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1176

has super-classes
Asymmetric Resource Consumption (Amplification) c
has sub-classes
Creation of Class Instance within a Static Code Block c, Creation of Immutable Text Using String Concatenation c, Excessive Data Query Operations in a Large Data Table c, Excessive Execution of Sequential Searches of Data Resource c, Static Member Data Element outside of a Singleton Class Element c

Inefficient Regular Expression Complexityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1333

has super-classes
Inefficient Algorithmic Complexity c

Inferential Statisticsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InferentialStatistics

has super-classes
Statistical Method c
has sub-classes
Estimation c, Hypothesis Testing c
is also defined as
named individual

Information Content Entityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InformationContentEntity

Is defined by
BFO, Cyc equiv, SUMO equiv, [Ontology Works] equiv
has super-classes
D3FEND Catalog Thing c
has sub-classes
Catalog c, Document c, External Knowledge Base c, License c, Source Code c
is in range of
cites op

Information Exposure through Microarchitectural State after Transient Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1342

has super-classes
Sensitive Information in Resource Not Removed Before Reuse c

Information Loss or Omissionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-221

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Declaration of Catch for Generic Exception c, Declaration of Throws for Generic Exception c, Obscured Security-relevant Information by Alternate Name c, Omission of Security-relevant Information c, Product UI does not Warn User of Unsafe Actions c, Truncation of Security-relevant Information c, User Interface (UI) Misrepresentation of Critical Information c

Ingress Tool Transferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1105

has super-classes
Command and Control Technique c
is also defined as
named individual

Inhibit System Recoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1490

has super-classes
Impact Technique c

Init Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InitScript

has super-classes
Executable Script c
has sub-classes
Network Init Script File Resource c, User Init Script c

Initial Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InitialAccess

has super-classes
Offensive Tactic c
is also defined as
named individual

Initial Access Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InitialAccessTechnique

has super-classes
Offensive Technique c
has sub-classes
Drive-by Compromise c, Exploit Public-Facing Application c, External Remote Services c, Hardware Additions c, Phishing c, Replication Through Removable Media c, Spearphishing Attachment c, Spearphishing Link c, Spearphishing via Service c, Supply Chain Compromise c, Trusted Relationship c, Valid Accounts c
is also defined as
named individual

Initialization with Hard-Coded Network Resource Configuration Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1051

has super-classes
Improper Initialization c

Input Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1056

has super-classes
Collection Technique c, Credential Access Technique c
has sub-classes
Credential API Hooking c, GUI Input Capture c, Keylogging c, Web Portal Capture c

Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InputDevice

has super-classes
Hardware Device c, Local Resource c
has sub-classes
Audio Input Device c, Keyboard Input Device c, Mouse Input Device c, Video Input Device c
is also defined as
named individual

Input Device Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InputDeviceAnalysis

has super-classes
Operating System Monitoring c
is also defined as
named individual

Input Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InputFunction

has super-classes
Subroutine c
has sub-classes
User Input Function c

Input Promptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1141

has super-classes
Credential Access Technique c

Insecure Automated Optimizationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1038

has super-classes
Improper Interaction Between Multiple Correctly-Behaving Entities c, Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c
has sub-classes
Compiler Optimization Removal or Modification of Security-critical Code c, Processor Optimization Removal or Modification of Security-critical Code c

Insecure Default Initialization of Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1188

has super-classes
Improper Initialization c
has sub-classes
Insecure Default Variable Initialization c

Insecure Default Variable Initializationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-453

has super-classes
Insecure Default Initialization of Resource c

Insecure Inherited Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-277

has super-classes
Incorrect Permission Assignment for Critical Resource c

Insecure Operation on Windows Junction / Mount Pointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1386

has super-classes
Improper Link Resolution Before File Access ('Link Following') c

Insecure Preserved Inherited Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-278

has super-classes
Incorrect Permission Assignment for Critical Resource c

Insecure Security Identifier Mechanismc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1294

has super-classes
Improper Access Control c
has sub-classes
Missing Security Identifier c

Insecure Storage of Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-922

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Cleartext Storage of Sensitive Information c, Storage of Sensitive Data in a Mechanism without Access Control c

Insecure Temporary Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-377

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
Creation of Temporary File With Insecure Permissions c, Creation of Temporary File in Directory with Insecure Permissions c

Insertion of Sensitive Information Into Debugging Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-215

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c

Insertion of Sensitive Information into Externally-Accessible File or Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-538

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c
has sub-classes
Exposure of WSDL File Containing Sensitive Information c, Inclusion of Sensitive Information in Source Code c, Insertion of Sensitive Information into Log File c

Insertion of Sensitive Information into Log Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-532

has super-classes
Insertion of Sensitive Information into Externally-Accessible File or Directory c

Insertion of Sensitive Information Into Sent Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-201

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c
has sub-classes
Use of GET Request Method With Sensitive Query Strings c

Install Digital Certificatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608.003

has super-classes
Stage Capabilities c

Install Root Certificatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1130

has super-classes
Defense Evasion Technique c

Install Root Certificatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.004

has super-classes
Subvert Trust Controls c
is also defined as
named individual

InstallUtilc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1118

has super-classes
Defense Evasion Technique c, Execution Technique c

InstallUtil Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.004

has super-classes
Signed Binary Proxy Execution c

Instance-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Instance-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Instant Messaging Clientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InstantMessagingClient

Is defined by
https://dbpedia.org/wiki/Instant_messaging
has super-classes
Collaborative Software c

Insufficient Adherence to Expected Conventionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1076

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Class Instance Self Destruction Control Element c, Class with Virtual Method without a Virtual Destructor c, Data Element containing Pointer Item without Proper Copy Control Element c, Excessive Reliance on Global Variables c, Explicit Call to Finalize() c, Inappropriate Source Code Style or Formatting c, Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor c, Parent Class without Virtual Destructor Method c, Persistent Storable Data Element without Associated Comparison Control Element c, Use of Object without Invoking Destructor Method c

Insufficient Control Flow Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-691

has super-classes
Weakness c
has sub-classes
Always-Incorrect Control Flow Implementation c, Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c, Deployment of Wrong Handler c, Excessive Iteration c, Improper Control of Interaction Frequency c, Improper Enforcement of Behavioral Workflow c, Improper Synchronization c, Incorrect Behavior Order c, Incorrect Control Flow Scoping c, Incorrect Short Circuit Evaluation c, Missing Handler c, Sequence of Processor Instructions Leads to Unexpected Behavior c, Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls c

Insufficient Control of Network Message Volume (Network Amplification)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-406

has super-classes
Asymmetric Resource Consumption (Amplification) c

Insufficient Documentation of Error Handling Techniquesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1118

has super-classes
Insufficient Technical Documentation c

Insufficient Encapsulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1061

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Critical Data Element Declared Public c, Data Access Operations Outside of Expected Data Manager Component c, Data Access from Outside Expected Data Manager Component c, Insufficient Encapsulation of Machine-Dependent Functionality c, Insufficient Isolation of System-Dependent Functions c, Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer c, Method Containing Access of a Member Element from Another Class c, Parent Class with References to Child Class c

Insufficient Encapsulation of Machine-Dependent Functionalityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1105

has super-classes
Insufficient Encapsulation c, Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c
has sub-classes
Reliance on Data/Memory Layout c

Insufficient Entropyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-331

has super-classes
Use of Insufficiently Random Values c
has sub-classes
Improper Handling of Insufficient Entropy in TRNG c, Insufficient Entropy in PRNG c

Insufficient Entropy in PRNGc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-332

has super-classes
Insufficient Entropy c

Insufficient Granularity of Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1220

has super-classes
Improper Access Control c
has sub-classes
Insufficient Granularity of Address Regions Protected by Register Locks c

Insufficient Granularity of Address Regions Protected by Register Locksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1222

has super-classes
Insufficient Granularity of Access Control c

Insufficient Isolation of Symbolic Constant Definitionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1107

has super-classes
Inappropriate Source Code Style or Formatting c

Insufficient Isolation of System-Dependent Functionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1100

has super-classes
Insufficient Encapsulation c

Insufficient Loggingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-778

has super-classes
Omission of Security-relevant Information c, Protection Mechanism Failure c

Insufficient or Incomplete Data Removal within Hardware Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1301

has super-classes
Sensitive Information in Resource Not Removed Before Reuse c
has sub-classes
Remanent Data Readable after Memory Erase c

Insufficient Precision or Accuracy of a Real Numberc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1339

has super-classes
Incorrect Calculation c

Insufficient Psychological Acceptabilityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-655

has super-classes
Protection Mechanism Failure c, Violation of Secure Design Principles c

Insufficient Resource Poolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-410

has super-classes
Improper Control of a Resource Through its Lifetime c

Insufficient Session Expirationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-613

has super-classes
Operation on a Resource after Expiration or Release c

Insufficient Technical Documentationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1059

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Incomplete Design Documentation c, Incomplete Documentation of Program Execution c, Incomplete I/O Documentation c, Insufficient Documentation of Error Handling Techniques c, Missing Documentation for Design c

Insufficient Type Distinctionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-351

has super-classes
Insufficient Verification of Data Authenticity c

Insufficient UI Warning of Dangerous Operationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-357

has super-classes
Protection Mechanism Failure c
has sub-classes
Multiple Interpretations of UI Input c

Insufficient Use of Symbolic Constantsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1106

has super-classes
Inappropriate Source Code Style or Formatting c

Insufficient Verification of Data Authenticityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-345

has super-classes
Protection Mechanism Failure c
has sub-classes
Acceptance of Extraneous Untrusted Data With Trusted Data c, Cross-Site Request Forgery (CSRF) c, Download of Code Without Integrity Check c, Improper Enforcement of Message Integrity During Transmission in a Communication Channel c, Improper Validation of Integrity Check Value c, Improper Verification of Cryptographic Signature c, Incomplete Identification of Uploaded File Variables (PHP) c, Insufficient Type Distinction c, Missing Source Correlation of Multiple Independent Data c, Missing Support for Integrity Check c, Origin Validation Error c, Reliance on File Name or Extension of Externally-Supplied File c, Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking c, Trust of System Event Data c, Use of Less Trusted Source c

Insufficient Visual Distinction of Homoglyphs Presented to Userc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1007

has super-classes
User Interface (UI) Misrepresentation of Critical Information c

Insufficiently Protected Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-522

has super-classes
Exposure of Resource to Wrong Sphere c, Weak Authentication c
has sub-classes
Missing Password Field Masking c, Password in Configuration File c, Plaintext Storage of a Password c, Storing Passwords in a Recoverable Format c, Unprotected Transport of Credentials c, Weak Encoding for Password c

Integer Coercion Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-192

has super-classes
Incorrect Conversion between Numeric Types c

Integer Overflow or Wraparoundc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-190

has super-classes
Incorrect Calculation c
is also defined as
named individual

Integer Overflow to Buffer Overflowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-680

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Integer Underflow (Wrap or Wraparound)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-191

has super-classes
Incorrect Calculation c

Integrated Honeynetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntegratedHoneynet

has super-classes
Decoy Environment c
is also defined as
named individual

integrationc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Integration

has super-classes
Mekanoid Object c

Integration Test Execution Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntegrationTestExecutionTool

has super-classes
Test Execution Tool c

Integrity Impactc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-IntegrityImpact

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. The Base Score is greatest when the consequence to the impacted component is highest.
is equivalent to
{ High , Low , None }
has super-classes
CVSS Metric c
has members
High ni, Low ni, None ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Inter-Process Communication Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1559

has super-classes
Execution Technique c
has sub-classes
Component Object Model Execution c, Dynamic Data Exchange Execution c, XPC Services c
is also defined as
named individual

Internal Asset Exposed to Unsafe Debug Access Level or Statec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1244

has super-classes
Incorrect Authorization c

Internal Defacementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1491.001

has super-classes
Defacement c
is also defined as
named individual

Internal Proxyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1090.001

has super-classes
Proxy c
is also defined as
named individual

Internal Spearphishingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1534

has super-classes
Lateral Movement Technique c
is also defined as
named individual

Internet Articlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetArticle

has super-classes
News Article c
is also defined as
named individual

Internet Article Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetArticleReference

has super-classes
Technique Reference c
has members
Reference - Catia UAF Plugin ni, Reference - Configure User Access Control and Permissions ni, Reference - Container Image Analysis ni, Reference - Cyber Command System (CYCS) ni, Reference - Dagger Fact Sheet ni, Reference - Decoy Personas for Safeguarding Online Identity Using Deception - MITRE ni, Reference - Detection of Malicious IDNHomoglyph Domains ni, Reference - Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise - CISA ni, Reference - FWTK - Firewall Toolkit ni, Reference - How ASLR protects Linux systems from buffer overflow attacks - Network World ni, Reference - How Does Antivirus Quarantine Work? - Safety Detectives ni, Reference - How to change registry values or permissions from a command line or a script ni, Reference - How trust relationships work for resource forests in Azure Active Directory Domain Services ni, Reference - MGT516: Managing Security Vulnerabilities: Enterprise and Cloud ni, Reference - NIST RMF Quick Start Guide - Assess Step - Frequently Asked Questions (FAQ) ni, Reference - Overview of the seccomp sandbox ni, Reference - Password and Key Rotation - SSH ni, Reference - Pointer Authentication Project Zero ni, Reference - Security Technologies: Stack Smashing Protection (StackGuard) - Red Hat ni, Reference - Tenable Passive Network Monitoring ni, Reference - The Pyramid of Pain - David Bianco ni, Reference - What is NX/XD feature? ni, Reference - http://www.biometric-solutions.com/keystroke-dynamics.html - biometric-solutions.com ni

Internet Connection Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1016.001

has super-classes
System Network Configuration Discovery c

Internet DNS Lookupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetDNSLookup

has super-classes
DNS Lookup c

Internet File Transfer Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetFileTransferTraffic

has super-classes
File Transfer Network Traffic c, Internet Network Traffic c

Internet Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetNetwork

Is defined by
http://dbpedia.org/resource/Internetworking
has super-classes
Network c

Internet Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InternetNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Inbound Internet Network Traffic c, Internet File Transfer Traffic c, Outbound Internet Network Traffic c
is also defined as
named individual

Interpretation Conflictc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-436

has super-classes
Improper Interaction Between Multiple Correctly-Behaving Entities c
has sub-classes
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') c, Improper Neutralization of Invalid Characters in Identifiers in Web Pages c, Incomplete Model of Endpoint Features c, Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') c, Misinterpretation of Input c, Null Byte Interaction Error (Poison Null Byte) c, Trusting HTTP Permission Methods on the Server Side c

Interprocess Communicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InterprocessCommunication

has super-classes
Digital Artifact c
has sub-classes
Pipe c
is also defined as
named individual

Interquartile Rangec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#InterquartileRange

has super-classes
Variability c
is disjoint with
Coefficient of Variation c, Mean Absolute Deviation c, Median Absolute Deviation c, Range c, Standard Deviation c, Variance c
is also defined as
named individual

Interval Estimationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntervalEstimation

has super-classes
Estimation c
is also defined as
named individual

Intranet Administrative Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetAdministrativeNetworkTraffic

has super-classes
Administrative Network Traffic c, Intranet Network Traffic c
is also defined as
named individual

Intranet DNS Lookupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetDNSLookup

has super-classes
DNS Lookup c

Intranet File Transfer Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetFileTransferTraffic

has super-classes
File Transfer Network Traffic c, Intranet Network Traffic c
is also defined as
named individual

Intranet IPC Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetIPCNetworkTraffic

has super-classes
IPC Network Traffic c, Intranet Network Traffic c
is also defined as
named individual

Intranet Multicast Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetMulticastNetworkTraffic

has super-classes
Intranet Network Traffic c
is also defined as
named individual

Intranet Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetNetwork

has super-classes
Network c
is also defined as
named individual

Intranet Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Intranet Administrative Network Traffic c, Intranet File Transfer Traffic c, Intranet IPC Network Traffic c, Intranet Multicast Network Traffic c, Intranet RPC Network Traffic c, Intranet Web Network Traffic c, Local Area Network Traffic c
is also defined as
named individual

Intranet RPC Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetRPCNetworkTraffic

has super-classes
Intranet Network Traffic c, RPC Network Traffic c

Intranet Web Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntranetWebNetworkTraffic

has super-classes
Intranet Network Traffic c, Web Network Traffic c
is also defined as
named individual

Intrinsically Semi-supervised Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntrinsicallySemi-supervisedLearning

has super-classes
Semi-Supervised Learning c
has sub-classes
Maximum-margin Learning c, Perturbation-based Learning c, Semi-supervised Generative Model Learning c, Semi-supervised Manifold Learning c
is also defined as
named individual

Intrusion Detection Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntrusionDetectionSystem

Is defined by
http://dbpedia.org/resource/Intrusion_detection_system
has super-classes
Digital Artifact c
has sub-classes
Intrusion Prevention System c

Intrusion Prevention Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IntrusionPreventionSystem

Is defined by
http://dbpedia.org/resource/Intrusion_detection_system#Intrusion_prevention
has super-classes
Intrusion Detection System c

Invalid Code Signaturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.001

has super-classes
Masquerading c
is also defined as
named individual

Invocation of a Control Element at an Unnecessarily Deep Horizontal Layerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1054

has super-classes
Insufficient Encapsulation c

Invocation of Process Using Visible Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-214

has super-classes
Exposure of Sensitive System Information to an Unauthorized Control Sphere c

Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1058

has super-classes
Improper Synchronization c

Invokable Control Element with Excessive File or Data Access Operationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1084

has super-classes
Asymmetric Resource Consumption (Amplification) c

Invokable Control Element with Excessive Volume of Commented-out Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1085

has super-classes
Inappropriate Source Code Style or Formatting c

Invokable Control Element with Large Number of Outward Callsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1048

has super-classes
Improper Adherence to Coding Standards c

Invokable Control Element with Signature Containing an Excessive Number of Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1064

has super-classes
Excessive Code Complexity c

Invokable Control Element with Variadic Parametersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1056

has super-classes
Excessive Code Complexity c

IO Port Restrictionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IOPortRestriction

has super-classes
Execution Isolation c
is also defined as
named individual

IOCc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/IOCRule

has super-classes
Detection Rule c

IP Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IPAddress

has super-classes
Identifier c
has sub-classes
IP Address v4 c, IP Address v6 c, Private IP Address c, Public IP Address c
is also defined as
named individual

IP Address v4c back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/IPv4

has super-classes
IP Address c
has members
10.1.12.1 ni, 10.1.12.101 ni, 109.107.181.33 ni, 162.248.51.100 ni, 46.4.205.200 ni

IP Address v6c back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/IPv6

has super-classes
IP Address c

IP Addressesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.005

has super-classes
Gather Victim Network Information c

IP Phonec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IPPhone

Is defined by
http://dbpedia.org/resource/VoIP_phone
has super-classes
Personal Computer c

IP Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IPReputationAnalysis

has super-classes
Identifier Reputation Analysis c
is also defined as
named individual

IPC Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IPCNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Intranet IPC Network Traffic c

IPC Traffic Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#IPCTrafficAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Irrelevant Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1164

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Assignment to Variable without Use c, Dead Code c, Empty Code Block c, Struts: Unused Validation Form c, Struts: Validator Without Form Field c

Isolatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Isolate

has super-classes
Defensive Tactic c
is also defined as
named individual

J2EE Bad Practices: Direct Management of Connectionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-245

has super-classes
Use of Low-Level Functionality c

J2EE Bad Practices: Direct Use of Socketsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-246

has super-classes
Use of Low-Level Functionality c

J2EE Bad Practices: Direct Use of Threadsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-383

has super-classes
Use of Low-Level Functionality c

J2EE Bad Practices: Non-serializable Object Stored in Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-579

has super-classes
Improper Following of Specification by Caller c

J2EE Bad Practices: Use of System.exit()c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-382

has super-classes
Incorrect Control Flow Scoping c

J2EE Framework: Saving Unserializable Objects to Diskc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-594

has super-classes
Improper Adherence to Coding Standards c

J2EE Misconfiguration: Data Transmission Without Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-5

has super-classes
Cleartext Transmission of Sensitive Information c

J2EE Misconfiguration: Entity Bean Declared Remotec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-8

has super-classes
Exposure of Resource to Wrong Sphere c

J2EE Misconfiguration: Insufficient Session-ID Lengthc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-6

has super-classes
Small Space of Random Values c

J2EE Misconfiguration: Missing Custom Error Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-7

has super-classes
Missing Custom Error Page c

J2EE Misconfiguration: Plaintext Password in Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-555

has super-classes
Password in Configuration File c

J2EE Misconfiguration: Weak Access Permissions for EJB Methodsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-9

has super-classes
Incorrect Privilege Assignment c

Java Archivec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JavaArchive

has super-classes
Archive File c, Software Package c

Java Runtime Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-537

has super-classes
Externally-Generated Error Message Containing Sensitive Information c

JavaScript Blobc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JavaScriptBlob

has super-classes
Binary Large Object c
is also defined as
named individual

JavaScript/JScriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.007

has super-classes
Command and Scripting Interpreter Execution c

Job Function Access Pattern Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JobFunctionAccessPatternAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

Job Schedulec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JobSchedule

has super-classes
Digital Artifact c
is also defined as
named individual

Job Scheduler Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JobSchedulerSoftware

has super-classes
System Service Software c
is also defined as
named individual

Journal Articlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#JournalArticle

has super-classes
Academic Article c

Junk Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1001.001

has super-classes
Data Obfuscation c

K-Center Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#K-CenterClustering

has super-classes
Graph-based Clustering c
is also defined as
named individual

K-Fold Cross-Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#K-FoldCross-Validation

has super-classes
Resampling Ensemble c
is also defined as
named individual

K-means Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#K-meansClustering

has super-classes
Centroid-based Clustering c
is also defined as
named individual

K-Nearest Neighborsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#K-NearestNeighbors

has super-classes
Classification c
is also defined as
named individual

Kendall's Rank Correlation Coefficientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KendallsRankCorrelationCoefficient

has super-classes
Rank Correlation c
is also defined as
named individual

Kerberoastingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1208

has super-classes
Credential Access Technique c

Kerberoastingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1558.003

has super-classes
Steal or Forge Kerberos Tickets c
is also defined as
named individual

Kerberos Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KerberosTicket

has super-classes
Access Token c
has sub-classes
Kerberos Ticket Granting Service Ticket c, Kerberos Ticket Granting Ticket c
is also defined as
named individual

Kerberos Ticket Granting Service Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KerberosTicketGrantingServiceTicket

has super-classes
Kerberos Ticket c

Kerberos Ticket Granting Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KerberosTicketGrantingTicket

has super-classes
Kerberos Ticket c, Ticket Granting Ticket c
is also defined as
named individual

Kernelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Kernel

has super-classes
System Software c
is also defined as
named individual

Kernel API Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KernelAPISensor

has super-classes
Endpoint Sensor c
is also defined as
named individual

Kernel Modulec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KernelModule

has super-classes
Object File c
is also defined as
named individual

Kernel Modules and Extensionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1215

has super-classes
Persistence Technique c

Kernel Modules and Extensionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.006

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Kernel Process Tablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KernelProcessTable

has super-classes
Digital Artifact c
is also defined as
named individual

Kernel-based Process Isolationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Kernel-basedProcessIsolation

has super-classes
Execution Isolation c
has sub-classes
Mandatory Access Control c, System Call Filtering c
has members
Mandatory Access Control ni, System Call Filtering ni
is also defined as
named individual

KernelCallbackTablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.013

has super-classes
Hijack Execution Flow c

Key Exchange without Entity Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-322

has super-classes
Missing Authentication for Critical Function c

Keyboard Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KeyboardInputDevice

has super-classes
Input Device c
is also defined as
named individual

Keychainc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1142

has super-classes
Credential Access Technique c
is also defined as
named individual

Keychainc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555.001

has super-classes
Credentials from Password Stores c
is also defined as
named individual

Keyloggingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1056.001

has super-classes
Input Capture c
is also defined as
named individual

Kiosk Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#KioskComputer

Is defined by
http://dbpedia.org/resource/Interactive_kiosk
has super-classes
Shared Computer c

Kurtosisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Kurtosis

has super-classes
Distribution Properties c
is disjoint with
Moments c, Skewness c
is also defined as
named individual

Lack of Administrator Control over Securityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-671

has super-classes
Violation of Secure Design Principles c
has sub-classes
Unimplemented or Unsupported Feature in UI c, Use of Hard-coded Credentials c

Laptop Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LaptopComputer

Is defined by
http://dbpedia.org/resource/Laptop
has super-classes
Personal Computer c

Large Data Table with Excessive Number of Indicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1089

has super-classes
Asymmetric Resource Consumption (Amplification) c

Latencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Latency

has super-classes
D3FEND Thing c
has sub-classes
Analytic Latency c, Eviction Latency c

Lateral Movementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LateralMovement

has super-classes
Offensive Tactic c
is also defined as
named individual

Lateral Movement Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LateralMovementTechnique

has super-classes
Offensive Technique c
has sub-classes
Application Access Token c, Application Deployment Software c, Exploitation of Remote Services c, Internal Spearphishing c, Lateral Tool Transfer c, Pass the Hash c, Pass the Ticket c, Remote Desktop Protocol c, Remote Service Session Hijacking c, Remote Services c, Replication Through Removable Media c, SSH Hijacking c, Software Deployment Tools Execution c, Taint Shared Content c, Use Alternate Authentication Material c, Web Session Cookie c, Windows Admin Shares c, Windows Remote Management c
is also defined as
named individual

Lateral Tool Transferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1570

has super-classes
Lateral Movement Technique c
is also defined as
named individual

Launch Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1159

has super-classes
Persistence Technique c

Launch Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1543.001

has super-classes
Create or Modify System Process c
is also defined as
named individual

Launch Daemonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1160

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Launch Daemonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1543.004

has super-classes
Create or Modify System Process c
is also defined as
named individual

Launchctlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1152

has super-classes
Defense Evasion Technique c, Execution Technique c, Persistence Technique c

Launchctlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1569.001

has super-classes
System Services c

Launchdc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.004

has super-classes
Scheduled Task/Job Execution c
is also defined as
named individual

LC_LOAD_DYLIB Additionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1161

has super-classes
Persistence Technique c

LC_LOAD_DYLIB Additionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.006

has super-classes
Event Triggered Execution c
is also defined as
named individual

LD_PRELOADc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.006

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Least Privilege Violationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-272

has super-classes
Privilege Dropping / Lowering Errors c

Legacy Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LegacySystem

has super-classes
Digital System c
is also defined as
named individual

Levenschtein Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LevenshteinMatching

has super-classes
Approximate String Matching c
is also defined as
named individual

Licensec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#License

has super-classes
Information Content Entity c
has sub-classes
Open Source License c, Proprietary License c

Linear Classifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinearClassifier

has super-classes
Classification c
is also defined as
named individual

Linear Logic Programmingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinearLogicProgramming

has super-classes
Logic Programming c
is also defined as
named individual

Linear Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinearRegression

has super-classes
Regression Analysis c
is also defined as
named individual

Linear Regression Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinearRegressionLearning

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Link Targetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608.005

has super-classes
Stage Capabilities c

Linux _Exitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Linux_Exit

Is defined by
https://man7.org/linux/man-pages/man2/exit.2.html
has super-classes
OS API Terminate Process c

Linux and Mac File and Directory Permissions Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1222.002

has super-classes
File and Directory Permissions Modification c

Linux Clonec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxClone

Is defined by
https://man7.org/linux/man-pages/man2/clone.2.html
has super-classes
OS API Create Process c

Linux Clone Argument CLONE_THREADc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxCloneArgumentCLONE_THREAD

Is defined by
https://man7.org/linux/man-pages/man2/clone.2.html
has super-classes
OS API Create Thread c

Linux Clone3c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxClone3

Is defined by
https://man7.org/linux/man-pages/man2/clone3.2.html
has super-classes
OS API Create Process c

Linux Clone3 Argument CLONE_THREADc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxClone3ArgumentCLONE_THREAD

Is defined by
https://man7.org/linux/man-pages/man2/clone3.2.html
has super-classes
OS API Create Thread c

Linux Connectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxConnect

Is defined by
https://man7.org/linux/man-pages/man2/connect.2.html
has super-classes
OS API Connect Socket c

Linux Creatc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxCreat

Is defined by
https://man7.org/linux/man-pages/man2/creat.2.html
has super-classes
OS API Create File c

Linux Execvec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxExecve

Is defined by
https://man7.org/linux/man-pages/man2/execve.2.html
has super-classes
OS API Exec c

Linux Execveatc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxExecveat

Is defined by
https://man7.org/linux/man-pages/man2/execveat.2.html
has super-classes
OS API Exec c

Linux Forkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxFork

Is defined by
https://man7.org/linux/man-pages/man2/fork.2.html
has super-classes
OS API Create Process c

Linux Kill Argument SIGKILLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxKillArgumentSIGKILL

Is defined by
https://man7.org/linux/man-pages/man2/kill.2.html
has super-classes
OS API Terminate Process c

Linux Mmapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxMmap

Is defined by
https://man7.org/linux/man-pages/man2/mmap.2.html
has super-classes
OS API Allocate Memory c

Linux Mmap2c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxMmap2

Is defined by
https://man7.org/linux/man-pages/man2/mmap2.2.html
has super-classes
OS API Allocate Memory c

Linux Munmapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxMunmap

Is defined by
https://man7.org/linux/man-pages/man2/munmap.2.html
has super-classes
OS API Free Memory c

Linux Open Argument O_CREATc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenArgumentO_CREAT

Is defined by
https://man7.org/linux/man-pages/man2/open.2.html
has super-classes
OS API Create File c

Linux Open Argument O_RDONLY, O_WRONLY, O_RDWRc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenArgumentO_RDONLY-O_WRONLY-O_RDWR

Is defined by
https://man7.org/linux/man-pages/man2/open.2.html
has super-classes
OS API Open File c

Linux OpenAt Argument O_CREATc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenAtArgumentO_CREAT

Is defined by
https://man7.org/linux/man-pages/man2/openat.2.html
has super-classes
OS API Create File c

Linux OpenAt Argument O_RDONLY, O_WRONLY, O_RDWRc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenAtArgumentO_RDONLY-O_WRONLY-O_RDWR

Is defined by
https://man7.org/linux/man-pages/man2/openat.2.html
has super-classes
OS API Open File c

Linux OpenAt2 Argument O_CREATc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenAt2ArgumentO_CREAT

Is defined by
https://man7.org/linux/man-pages/man2/openat2.2.html
has super-classes
OS API Create File c

Linux OpenAt2 Argument O_RDONLY, O_WRONLY, O_RDWRc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxOpenAt2ArgumentO_RDONLY-O_WRONLY-O_RDWR

Is defined by
https://man7.org/linux/man-pages/man2/openat2.2.html
has super-classes
OS API Open File c

Linux Pause Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxPauseProcess

Is defined by
https://man7.org/linux/man-pages/man2/pause.2.html
has super-classes
OS API Suspend Process c

Linux Pause Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxPauseThread

Is defined by
https://man7.org/linux/man-pages/man2/pause.2.html
has super-classes
OS API Suspend Thread c

Linux Ptrace Argument PTRACE_INTERRUPTc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxPtraceArgumentPTRACEINTERRUPT

Is defined by
https://man7.org/linux/man-pages/man2/ptrace.2.html
has super-classes
OS API Suspend Process c

Linux Ptrace Argument PTRACE_TRACEMEc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxPtraceArgumentPTRACE_TRACEME

Is defined by
https://man7.org/linux/man-pages/man2/ptrace.2.html
has super-classes
OS API Trace Process c

Linux Readc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxRead

Is defined by
https://man7.org/linux/man-pages/man2/read.2.html
has super-classes
OS API Read File c

Linux Readvc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxReadv

Is defined by
https://man7.org/linux/man-pages/man2/readv.2.html
has super-classes
OS API Read File c

Linux Renamec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxRename

Is defined by
https://man7.org/linux/man-pages/man2/rename.2.html
has super-classes
OS API Move File c

Linux Renameatc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxRenameat

Is defined by
https://man7.org/linux/man-pages/man2/renameat.2.html
has super-classes
OS API Move File c

Linux Renameat2c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxRenameat2

Is defined by
https://man7.org/linux/man-pages/man2/renameat2.2.html
has super-classes
OS API Move File c

Linux Socketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxSocket

Is defined by
https://man7.org/linux/man-pages/man2/socket.2.html
has super-classes
OS API Create Socket c

Linux Socketcall Argument SYS_CONNECTc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxSocketcallArgumentSYS_CONNECT

Is defined by
https://man7.org/linux/man-pages/man2/socketcall.2.html
has super-classes
OS API Connect Socket c

Linux Socketcall Argument SYS_SOCKETc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxSocketcallArgumentSYS_SOCKET

Is defined by
https://man7.org/linux/man-pages/man2/socketcall.2.html
has super-classes
OS API Create Socket c

Linux Timec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxTime

Is defined by
https://man7.org/linux/man-pages/man2/time.2.html
has super-classes
OS API Get System Time c

Linux Unlinkatc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxUnlinkat

Is defined by
https://man7.org/linux/man-pages/man2/unlinkat.2.html
has super-classes
OS API Delete File c

Linux Vforkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxVfork

Is defined by
https://man7.org/linux/man-pages/man2/vfork.2.html
has super-classes
OS API Create Process c

Linux Writec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxWrite

Is defined by
https://man7.org/linux/man-pages/man2/write.2.html
has super-classes
OS API Write File c

Linux Writevc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LinuxWritev

Is defined by
https://man7.org/linux/man-pages/man2/writev.2.html
has super-classes
OS API Write File c

ListPlantingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.015

has super-classes
Process Injection c

LLMNR/NBT-NS Poisoning and Relayc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1171

has super-classes
Credential Access Technique c

LLMNR/NBT-NS Poisoning and SMB Relayc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1557.001

has super-classes
Man-in-the-Middle c
is also defined as
named individual

Local Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1087.001

has super-classes
Create Account c
is also defined as
named individual

Local Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1136.001

has super-classes
Create Account c

Local Account Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalAccountMonitoring

has super-classes
User Behavior Analysis c
is also defined as
named individual

Local Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1078.003

has super-classes
Valid Accounts c
is also defined as
named individual

Local Area Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalAreaNetwork

has super-classes
Network c
is also defined as
named individual

Local Area Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalAreaNetworkTraffic

has super-classes
Intranet Network Traffic c
is also defined as
named individual

Local Authentication Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalAuthenticationService

has super-classes
Authentication Service c, System Service Software c

Local Authorization Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalAuthorizationService

has super-classes
Authorization Service c, System Service Software c

Local Data Stagingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1074.001

has super-classes
Data Staged c
is also defined as
named individual

Local Email Collectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1114.001

has super-classes
Email Collection c
is also defined as
named individual

Local File Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalFilePermissions

has super-classes
Platform Hardening c
is also defined as
named individual

Local Groupsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1069.001

has super-classes
Permission Groups Discovery c

Local Job Schedulingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1168

has super-classes
Execution Technique c, Persistence Technique c

Local Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalResource

has super-classes
Resource c
has sub-classes
Input Device c, Startup Directory c, System Configuration Init Resource c, User Logon Init Resource c
is also defined as
named individual

Local Resource Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalResourceAccess

has super-classes
Resource Access c
is also defined as
named individual

Local User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LocalUserAccount

has super-classes
User Account c
is also defined as
named individual

Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Log

has super-classes
Digital Artifact c, Record c
has sub-classes
Authentication Log c, Authorization Log c, Event Log c, Packet Log c
is also defined as
named individual

Log Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogFile

has super-classes
File c
has sub-classes
Command History Log File c, Operating System Log File c
is also defined as
named individual

Log Message Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogMessageFunction

has super-classes
Subroutine c

Logging of Excessive Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-779

has super-classes
Uncontrolled Resource Consumption c

Logic Programmingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogicProgramming

has super-classes
Symbolic AI c
has sub-classes
Answer Set Programming c, Datalog c, Linear Logic Programming c, Prolog c
is also defined as
named individual

Logic/Time Bombc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-511

has super-classes
Embedded Malicious Code c

Logical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogicalLinkMapping

has super-classes
Network Mapping c
has sub-classes
Active Logical Link Mapping c, Passive Logical Link Mapping c
has members
Active Logical Link Mapping ni, Passive Logical Link Mapping ni
is also defined as
named individual

Logical Rulesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogicalRules

has super-classes
Symbolic Logic c
has sub-classes
Boolean Expression Matching c, Equivalence Matching c, Pattern Matching c
is also defined as
named individual

Login Itemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1162

has super-classes
Persistence Technique c

Login Itemsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.015

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Login Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LoginSession

has super-classes
Session c
has sub-classes
Remote Session c
is also defined as
named individual

Logistic Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogisticRegression

has super-classes
Regression Analysis c
is also defined as
named individual

Logistic Regression Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogististicRegressionLearning

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Logon Script (Mac)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037.002

has super-classes
Boot or Logon Initialization Scripts c
is also defined as
named individual

Logon Script (Windows)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037.001

has super-classes
Boot or Logon Initialization Scripts c
is also defined as
named individual

Logon Userc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LogonUser

has super-classes
System Call c
is also defined as
named individual

Long Short-term Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#LongShort-termMemory

has super-classes
Recurrent Neural Network c
is also defined as
named individual

Loop Condition Value Update within the Loopc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1095

has super-classes
Excessive Code Complexity c

Loop with Unreachable Exit Condition ('Infinite Loop')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-835

has super-classes
Excessive Iteration c

Low Severity Vulnerabilityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/LowSeverityVulnerability

is equivalent to
vulnerability c and (((base score dp some ) and (base score dp some )) or (severity op value Low))
has super-classes
vulnerability c

LSA Secretsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.004

has super-classes
OS Credential Dumping c
is also defined as
named individual

LSASS Driverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1177

has super-classes
Execution Technique c, Persistence Technique c

LSASS Driverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.008

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

LSASS Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.001

has super-classes
OS Credential Dumping c
is also defined as
named individual

MAC Addressc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/MACAddress

Example
00-1B-63-84-45-E6
00:1b:63:84:45:e6
has super-classes
Identifier c, Observable c

Machine Actionc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/MachineAction

An action performed by an automapted process, script, or an application following a high level objective. May contain a single or miple Commands. Managing systems and application resources by interacting with API endpoints are examples of machine actions.
has super-classes
Digital Event c, Mekanoid Thing c
has sub-classes
Automated Task Run c
is disjoint with
User Action c

Machine Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MachineLearning

has super-classes
Analytic Technique c
has sub-classes
Active Learning c, Ensemble Learning c, Reinforcement Learning c, Semi-Supervised Learning c, Supervised Learning c, Transfer Learning c, Transformer-based Learning c, Unsupervised Learning c
is also defined as
named individual

MacOS Keychainc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MacOSKeychain

has super-classes
Password Store c
is also defined as
named individual

Mail Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MailNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Inbound Internet Mail Traffic c
is also defined as
named individual

Mail Protocolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1071.003

has super-classes
Application Layer Protocol c
is also defined as
named individual

Mail Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MailServer

has super-classes
Server c
is also defined as
named individual

Mail Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MailService

has super-classes
Network Service c
has sub-classes
Message Transfer Agent c

Make and Impersonate Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134.003

has super-classes
Access Token Manipulation c
is also defined as
named individual

Malicious File Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1204.002

has super-classes
User Execution c
is also defined as
named individual

Malicious Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1204.003

has super-classes
User Execution c

Malicious Link Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1204.001

has super-classes
User Execution c
is also defined as
named individual

Malicious Shell Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1156

has super-classes
Persistence Technique c

Malicious Softwarec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Malware

is equivalent to
Software c and (has goal op some Offensive Technique c)
has super-classes
Mekanoid Thing c, Software c

Malwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1587.001

has super-classes
Develop Capabilities c

Malwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.001

has super-classes
Obtain Capabilities c

Man in the Browserc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1185

has super-classes
Collection Technique c
is also defined as
named individual

Man-in-the-Middlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1557

has super-classes
Collection Technique c, Credential Access Technique c
has sub-classes
ARP Cache Poisoning c, DHCP Spoofing c, LLMNR/NBT-NS Poisoning and SMB Relay c
is also defined as
named individual

Mandatory Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MandatoryAccessControl

has super-classes
Kernel-based Process Isolation c
is also defined as
named individual

Manual Task Runc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/ManualTaskRun

has super-classes
Task Run c, User Action c

Mark-of-the-Web Bypassc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.005

has super-classes
Subvert Trust Controls c

Masquerade Task or Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.004

has super-classes
Masquerading c
is also defined as
named individual

Masqueradingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036

has super-classes
Defense Evasion Technique c
has sub-classes
Double File Extension c, Invalid Code Signature c, Masquerade Task or Service c, Match Legitimate Name or Location c, Rename System Utilities c, Right-to-Left Override c, Space after Filename c

Match Legitimate Name or Locationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.005

has super-classes
Masquerading c
is also defined as
named individual

Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Matching

has super-classes
Analytical Purpose c
is disjoint with
Classifying c, Forecasting c, Media Generation c, Summarizing c

Mathematical Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MathematicalFunction

has super-classes
Subroutine c
is also defined as
named individual

Mavinjectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.013

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Maximum-margin Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Maximum-marginLearning

has super-classes
Intrinsically Semi-supervised Learning c
is also defined as
named individual

MD5 Hashc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/MD5

MD5 cryptographic hash value
has super-classes
Hash c

Meanc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Mean

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Harmonic Mean c, Median c, Mode c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Mean Absolute Deviationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MeanAbsoluteDeviation

has super-classes
Average Absolute Deviation c
is disjoint with
Coefficient of Variation c, Interquartile Range c, Median Absolute Deviation c, Range c, Standard Deviation c, Variance c
is also defined as
named individual

Media Generationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Generation

has super-classes
Analytical Purpose c
has sub-classes
Media Generation c, Simulation c
is disjoint with
Classifying c, Forecasting c, Matching c, Summarizing c

Media Generationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MediaGeneration

has super-classes
Media Generation c
is disjoint with
Simulation c

Media Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MediaServer

Is defined by
http://dbpedia.org/resource/Media_server
has super-classes
Server c

Medianc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Median

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Harmonic Mean c, Mean c, Mode c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Median Absolute Deviationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MedianAbsoluteDeviation

has super-classes
Average Absolute Deviation c
is disjoint with
Coefficient of Variation c, Interquartile Range c, Mean Absolute Deviation c, Range c, Standard Deviation c, Variance c
is also defined as
named individual

Medium Severity Vulnerabilityc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/MediumSeverityVulnerability

is equivalent to
vulnerability c and (((base score dp some ) and (base score dp some )) or (severity op value Medium))
has super-classes
vulnerability c

Mekanoid Objectc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/SystemObject

A foundational class in the Mekanoid ontology representing the core system objects. It serves as a superclass for various entities including integrations, app users, task patterns, templates, connections, task runs, tenants, task run logs, data templates, and tasks. This class is integral to organizing and defining the structure and relationships of system objects within the Mekanoid framework.
has super-classes
Mekanoid Thing c
has sub-classes
Data Template c, Mekanoid User Account c, Task Pattern c, Task Run c, Task Run Log c, Task Template c, connection c, filter c, integration c, task c, tenant c

Mekanoid Thingc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/MekaThing

has super-classes
has sub-classes
ASN c, Actionable Item c, Advisory c, Analysis Report c, Hash c, Incident Status c, Machine Action c, Malicious Software c, Mekanoid Object c, NPM Package c, Network Service c, Observable c, Operation c, Payload c, Subroutine c, communication protocol c, control c, verdict c
is in domain of
has timestamp dp

Mekanoid User Accountc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/AppUser

Mekanoid User Account
has super-classes
Application User Account c, Mekanoid Object c

Memory Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryAddress

has super-classes
Digital Artifact c
has sub-classes
Physical Address c, Virtual Address c
is also defined as
named individual

Memory Address Spacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryAddressSpace

has super-classes
Address Space c
has sub-classes
Virtual Memory Space c
is also defined as
named individual

Memory Allocation Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryAllocationFunction

has super-classes
Subroutine c
is also defined as
named individual

Memory Allocation with Excessive Size Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-789

has super-classes
Allocation of Resources Without Limits or Throttling c, Improper Validation of Specified Quantity in Input c

Memory Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryBlock

has super-classes
Memory Extent c
has sub-classes
Page c, Page Frame c, Tertiary Storage c
is also defined as
named individual

Memory Boundary Trackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryBoundaryTracking

has super-classes
Operating System Monitoring c
is also defined as
named individual

Memory Extentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryExtent

has super-classes
Digital Artifact c
has sub-classes
Memory Block c, Memory Pool c, Memory Word c

Memory Free Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryFreeFunction

has super-classes
Subroutine c
is also defined as
named individual

Memory Management Unitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryManagementUnit

has super-classes
Processor Component c
is also defined as
named individual

Memory Management Unit Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryManagementUnitComponent

has super-classes
Hardware Device c
has sub-classes
Translation Lookaside Buffer c

Memory Poolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryPool

has super-classes
Memory Extent c
is also defined as
named individual

Memory Protection Unitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryProtectionUnit

has super-classes
Processor Component c
is also defined as
named individual

Memory Wordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MemoryWord

has super-classes
Memory Extent c
is also defined as
named individual

Message Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MessageAnalysis

has super-classes
Defensive Technique c
has sub-classes
Sender MTA Reputation Analysis c, Sender Reputation Analysis c
has members
Sender MTA Reputation Analysis ni, Sender Reputation Analysis ni
is also defined as
named individual

Message Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MessageAuthentication

has super-classes
Message Hardening c
is also defined as
named individual

Message Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MessageEncryption

has super-classes
Message Hardening c
is also defined as
named individual

Message Hardeningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MessageHardening

has super-classes
Defensive Technique c
has sub-classes
Message Authentication c, Message Encryption c, Transfer Agent Authentication c
has members
Message Authentication ni, Message Encryption ni, Transfer Agent Authentication ni
is also defined as
named individual

Message Transfer Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MessageTransferAgent

has super-classes
Mail Service c
is also defined as
named individual

Metadatac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Metadata

Is defined by
http://dbpedia.org/resource/Metadata
has super-classes
Digital Artifact c
has sub-classes
File System Metadata c

Method Containing Access of a Member Element from Another Classc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1090

has super-classes
Insufficient Encapsulation c

Microcodec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Microcode

Is defined by
http://dbpedia.org/resource/Microcode
has super-classes
Firmware c

Microsoft HTML Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MicrosoftHTMLApplication

has super-classes
HTML File c
is also defined as
named individual

Mirrored Regions with Different Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1251

has super-classes
Improper Preservation of Consistency Between Independent Representations of Shared State c

Misinterpretation of Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-115

has super-classes
Interpretation Conflict c

Mismatched Memory Management Routinesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-762

has super-classes
Release of Invalid Pointer or Reference c
has sub-classes
Free of Memory not on the Heap c

Missing Ability to Patch ROM Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1310

has super-classes
Reliance on Component That is Not Updateable c

Missing Authentication for Critical Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-306

has super-classes
Improper Authentication c
has sub-classes
Authentication Bypass Using an Alternate Path or Channel c, Key Exchange without Entity Authentication c

Missing Authorizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-862

Broad and could apply to all resource accesses.
has super-classes
Improper Authorization c
has sub-classes
Direct Request ('Forced Browsing') c, Improper Authorization in Handler for Custom URL Scheme c, Missing Write Protection for Parametric Data Values c, Not Using Complete Mediation c

Missing Check for Certificate Revocation after Initial Checkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-370

has super-classes
Improper Check for Certificate Revocation c

Missing Critical Step in Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-304

has super-classes
Improper Following of Specification by Caller c, Incorrect Implementation of Authentication Algorithm c

Missing Cryptographic Stepc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-325

has super-classes
Improper Following of Specification by Caller c

Missing Custom Error Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-756

has super-classes
Improper Handling of Exceptional Conditions c
has sub-classes
ASP.NET Misconfiguration: Missing Custom Error Page c, J2EE Misconfiguration: Missing Custom Error Page c

Missing Default Case in Multiple Condition Expressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-478

has super-classes
Incomplete Comparison with Missing Factors c

Missing Documentation for Designc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1053

has super-classes
Insufficient Technical Documentation c

Missing Encryption of Sensitive Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-311

has super-classes
Protection Mechanism Failure c
has sub-classes
Cleartext Storage of Sensitive Information c, Cleartext Transmission of Sensitive Information c

Missing Handlerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-431

has super-classes
Insufficient Control Flow Management c

Missing Immutable Root of Trust in Hardwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1326

has super-classes
Protection Mechanism Failure c

Missing Initialization of a Variablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-456

has super-classes
Missing Initialization of Resource c

Missing Initialization of Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-909

has super-classes
Improper Initialization c
has sub-classes
Missing Initialization of a Variable c, Uninitialized Value on Reset for Registers Holding Security Settings c

Missing Lock Checkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-414

has super-classes
Improper Locking c

Missing Origin Validation in WebSocketsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1385

has super-classes
Origin Validation Error c

Missing Password Field Maskingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-549

has super-classes
Insufficiently Protected Credentials c

Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniquesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1278

has super-classes
Protection Mechanism Failure c

Missing Protection for Mirrored Regions in On-Chip Fabric Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1312

has super-classes
Improper Access Control c

Missing Protection Mechanism for Alternate Hardware Interfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1299

has super-classes
Authentication Bypass Using an Alternate Path or Channel c, Unprotected Alternate Channel c

Missing Reference to Active Allocated Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-771

has super-classes
Uncontrolled Resource Consumption c
has sub-classes
Missing Reference to Active File Descriptor or Handle c

Missing Reference to Active File Descriptor or Handlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-773

has super-classes
Missing Reference to Active Allocated Resource c

Missing Release of File Descriptor or Handle after Effective Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-775

has super-classes
Missing Release of Resource after Effective Lifetime c

Missing Release of Memory after Effective Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-401

has super-classes
Missing Release of Resource after Effective Lifetime c

Missing Release of Resource after Effective Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-772

has super-classes
Improper Resource Shutdown or Release c
has sub-classes
Missing Release of File Descriptor or Handle after Effective Lifetime c, Missing Release of Memory after Effective Lifetime c, Use of Object without Invoking Destructor Method c

Missing Report of Error Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-392

has super-classes
Improper Check or Handling of Exceptional Conditions c, Incorrect Provision of Specified Functionality c

Missing Security Identifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1302

has super-classes
Insecure Security Identifier Mechanism c

Missing Serialization Control Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1066

has super-classes
Improper Adherence to Coding Standards c

Missing Source Correlation of Multiple Independent Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1293

has super-classes
Insufficient Verification of Data Authenticity c

Missing Standardized Error Handling Mechanismc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-544

has super-classes
Improper Handling of Exceptional Conditions c

Missing Support for Integrity Checkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-353

has super-classes
Insufficient Verification of Data Authenticity c

Missing Support for Security Features in On-chip Fabrics or Busesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1318

has super-classes
Protection Mechanism Failure c

Missing Synchronizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-820

has super-classes
Improper Synchronization c
has sub-classes
Singleton Class Instance Creation without Proper Locking or Synchronization c, Unsynchronized Access to Shared Data in a Multithreaded Context c, Use of Singleton Pattern Without Synchronization in a Multithreaded Context c

Missing Validation of OpenSSL Certificatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-599

has super-classes
Improper Certificate Validation c

Missing Write Protection for Parametric Data Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1314

has super-classes
Missing Authorization c

Missing XML Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-112

has super-classes
Improper Validation of Syntactic Correctness of Input c

MMCc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.014

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Mobile Phonec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MobilePhone

Is defined by
http://dbpedia.org/resource/Mobile_phone
has super-classes
Personal Computer c

Modal Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ModalLogic

has super-classes
Symbolic AI c
has sub-classes
Alethic Logic c, Deontic Logic c, Epistemic Logic c, Temporal Logic c
is also defined as
named individual

Modec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Mode

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Harmonic Mean c, Mean c, Median c, Trimmed Mean c, Weighted Mean c
is also defined as
named individual

Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Model

has super-classes
Defensive Tactic c
is also defined as
named individual

Model-based Policy Optimizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Model-basedPolicyOptimization

has super-classes
Model-based Reinforcement Learning c
is also defined as
named individual

Model-based Reinforcement Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Model-basedReinforcementLearning

has super-classes
Reinforcement Learning c
has sub-classes
Dyna-Q c, Model-based Policy Optimization c, Model-based Value Iteration c
is also defined as
named individual

Model-based Value Iterationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Model-basedValueIteration

has super-classes
Model-based Reinforcement Learning c
is also defined as
named individual

Model-free Reinforcement Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Model-freeReinforcementLearning

has super-classes
Reinforcement Learning c
has sub-classes
Policy Gradient c, Q-Learning c, SARSA c, Temporal Difference Learning c
is also defined as
named individual

Modemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Modem

Is defined by
http://dbpedia.org/resource/Modem
has super-classes
Network Node c
has sub-classes
Dial Up Modem c, Optical Modem c, Radio Modem c

Modification of Assumed-Immutable Data (MAID)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-471

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
External Control of Assumed-Immutable Web Parameter c, PHP External Variable Modification c, Public Static Final Field References Mutable Object c, Reliance on IP Address for Authentication c

Modify Authentication Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556

has super-classes
Credential Access Technique c, Defense Evasion Technique c
has sub-classes
Domain Controller Authentication c, Network Device Authentication c, Password Filter DLL c, Pluggable Authentication Modules c, Reversible Encryption c
is also defined as
named individual

Modify Cloud Compute Infrastructurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1578

has super-classes
Defense Evasion Technique c
has sub-classes
Create Cloud Instance c, Create Snapshot c, Delete Cloud Instance c, Revert Cloud Instance c

Modify Existing Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1031

has super-classes
Persistence Technique c

Modify Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1112

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Modify System Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1601

has super-classes
Defense Evasion Technique c
has sub-classes
Downgrade System Image c, Patch System Image c

Modules with Circular Dependenciesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1047

has super-classes
Excessive Code Complexity c

Momentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Moments

has super-classes
Distribution Properties c
is disjoint with
Kurtosis c, Skewness c
is also defined as
named individual

Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Monitoring

Is defined by
http://wordnet-rdf.princeton.edu/id/00881724-n
has super-classes
D3FEND Thing c

Mouse Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MouseInputDevice

Is defined by
http://dbpedia.org/resource/Computer_mouse
has super-classes
Input Device c

Move Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MoveFile

has super-classes
System Call c
is also defined as
named individual

Moving Average Modelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MovingAverageModel

has super-classes
Time Series Analysis c
is also defined as
named individual

MSBuildc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1127.001

has super-classes
Trusted Developer Utilities Proxy Execution c
is also defined as
named individual

Mshtac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1170

has super-classes
Defense Evasion Technique c, Execution Technique c

Mshta Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.005

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Msiexec Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.007

has super-classes
Signed Binary Proxy Execution c

Multi-factor Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Multi-factorAuthentication

has super-classes
Credential Hardening c
is also defined as
named individual

Multi-Factor Authentication Request Generationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1621

has super-classes
Credential Access Technique c

Multi-hop Proxyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1090.003

has super-classes
Proxy c
is also defined as
named individual

Multi-hop Proxyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1188

has super-classes
Command and Control Technique c

Multi-Stage Channelsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1104

has super-classes
Command and Control Technique c
is also defined as
named individual

Multiclass Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MulticlassClassification

has super-classes
Classifying c

Multilayer Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1079

has super-classes
Command and Control Technique c

Multilayer Perceptron Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MultilayerPerceptronClassification

has super-classes
Artificial Neural Network Classification c
is also defined as
named individual

Multimedia Document Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MultimediaDocumentFile

has super-classes
Document File c

Multiple Binds to the Same Portc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-605

has super-classes
Multiple Operations on Resource in Single-Operation Context c, Operation on Resource in Wrong Phase of Lifetime c

Multiple Inheritance from Concrete Classesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1055

has super-classes
Excessively Complex Data Representation c

Multiple Interpretations of UI Inputc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-450

has super-classes
Insufficient UI Warning of Dangerous Operations c

Multiple Locks of a Critical Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-764

has super-classes
Improper Locking c, Multiple Operations on Resource in Single-Operation Context c

Multiple Operations on Resource in Single-Operation Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-675

has super-classes
Improper Following of Specification by Caller c
has sub-classes
Double Decoding of the Same Data c, Multiple Binds to the Same Port c, Multiple Locks of a Critical Resource c, Multiple Releases of Same Resource or Handle c, Multiple Unlocks of a Critical Resource c

Multiple Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MultipleRegression

has super-classes
Regression Analysis c
is also defined as
named individual

Multiple Regression Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MultipleRegressionLearning

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Multiple Releases of Same Resource or Handlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1341

has super-classes
Multiple Operations on Resource in Single-Operation Context c
has sub-classes
Double Free c

Multiple Unlocks of a Critical Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-765

has super-classes
Improper Locking c, Multiple Operations on Resource in Single-Operation Context c

Multivariate Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#MultivariateAnalysis

has super-classes
Statistical Method c
has sub-classes
Discriminant Analysis c, Principal Component Analysis c
is also defined as
named individual

Mutable Attestation or Measurement Reporting Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1283

has super-classes
Improper Access Control c

Naive Bayes Classifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NaiveBayesClassifier

has super-classes
Classification c
is also defined as
named individual

Native API Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1106

has super-classes
Execution Technique c
is also defined as
named individual

Netsh Helper DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1128

has super-classes
Persistence Technique c

Netsh Helper DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.007

has super-classes
Event Triggered Execution c
is also defined as
named individual

Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Network

has super-classes
Digital Artifact c
has sub-classes
Internet Network c, Intranet Network c, Local Area Network c, Wide Area Network c
is also defined as
named individual

Network Address Translation Traversalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1599.001

has super-classes
Network Boundary Bridging c

Network Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CollectorAgent

has super-classes
Software c
is also defined as
named individual

Network Boundary Bridgingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1599

has super-classes
Defense Evasion Technique c
has sub-classes
Network Address Translation Traversal c

Network Card Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkCardFirmware

has super-classes
Peripheral Firmware c

Network Denial of Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1498

has super-classes
Impact Technique c
has sub-classes
Direct Network Flood c, Reflection Amplification c, Service Exhaustion Flood c

Network Device Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556.004

has super-classes
Modify Authentication Process c

Network Device CLIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.008

has super-classes
Command and Scripting Interpreter Execution c

Network Device Configuration Dumpc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1602.002

has super-classes
Data from Configuration Repository c

Network Directory Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkDirectoryResource

has super-classes
Network File Share Resource c
is also defined as
named individual

Network File Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkFileResource

has super-classes
Network File Share Resource c
has sub-classes
Network Init Script File Resource c, Web File Resource c
is also defined as
named individual

Network File Share Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkFileShareResource

has super-classes
Network Resource c
has sub-classes
Network Directory Resource c, Network File Resource c
is also defined as
named individual

Network Flowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkFlow

has super-classes
Digital Artifact c
is also defined as
named individual

Network Flow Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkFlowSensor

has super-classes
Network Sensor c
is also defined as
named individual

Network Init Script File Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkInitScriptFileResource

has super-classes
Init Script c, Network File Resource c
is also defined as
named individual

Network Isolationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkIsolation

has super-classes
Defensive Technique c
has sub-classes
Broadcast Domain Isolation c, DNS Allowlisting c, DNS Denylisting c, Encrypted Tunnels c, Network Traffic Filtering c
has members
Broadcast Domain Isolation ni, DNS Allowlisting ni, DNS Denylisting ni, Encrypted Tunnels ni, Network Traffic Filtering ni
is also defined as
named individual

Network Logon Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037.003

has super-classes
Boot or Logon Initialization Scripts c
is also defined as
named individual

Network Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkMapping

has super-classes
Defensive Technique c
has sub-classes
Logical Link Mapping c, Network Traffic Policy Mapping c, Network Vulnerability Assessment c, Physical Link Mapping c
has members
Logical Link Mapping ni, Network Traffic Policy Mapping ni, Network Vulnerability Assessment ni, Physical Link Mapping ni
is also defined as
named individual

Network Nodec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkNode

has super-classes
Digital Artifact c
has sub-classes
Firewall c, Host c, Modem c, Proxy Server c, RF Node c, Router c, Switch c, Wireless Access Point c
is also defined as
named individual

Network Node Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkNodeInventory

has super-classes
Asset Inventory c
is also defined as
named individual

Network Packetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkPackets

has super-classes
Network Traffic c
is also defined as
named individual

Network Printerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkPrinter

Is defined by
http://dbpedia.org/resource/Printer_(computing)
has super-classes
Shared Computer c

Network Protocol Analyzerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkProtocolAnalyzer

has super-classes
Network Sensor c
is also defined as
named individual

Network Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkResource

has super-classes
Remote Resource c
has sub-classes
Network File Share Resource c, Web Resource c
is in range of
accesses op
is also defined as
named individual

Network Resource Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkResourceAccess

has super-classes
Resource Access c
has sub-classes
Web Resource Access c
is also defined as
named individual

Network Security Appliancesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.006

has super-classes
Gather Victim Network Information c

Network Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkSensor

has super-classes
Sensor c
has sub-classes
Network Flow Sensor c, Network Protocol Analyzer c

Network Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkService

Is defined by
http://dbpedia.org/resource/Network_service
has super-classes
Service Application Process c
has sub-classes
Authorization Service c, Directory Service c, File Share Service c, Mail Service c, Remote Authentication Service c

Network Servicec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/NetworkServiceProtocol

Is defined by
https://en.wikipedia.org/wiki/Application_layer#Protocols
has super-classes
Mekanoid Thing c
has members
DNS Service ni, FTP Service ni, HTTP Service ni, SSH Service ni, SSL Service ni

Network Service Scanningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1046

has super-classes
Discovery Technique c

Network Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkSession

has super-classes
Network Traffic c
has sub-classes
Remote Command c, Remote Terminal Session c
has members
CKZ5qK3CTEwMCAJpIi ni, CmXHCZ3b4RlraAFfdg ni, Coc5xh3dIfFS5k4Gdh ni, CtVKme2wtPfUO03gW8 ni, CxRSbB3QLImGRarD51 ni, Cy9RQD31jwWTNsvafg ni
is also defined as
named individual

Network Share Connection Removalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.005

has super-classes
Indicator Removal on Host c
is also defined as
named individual

Network Share Connection Removalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1126

has super-classes
Defense Evasion Technique c

Network Share Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1135

has super-classes
Discovery Technique c

Network Sniffingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1040

has super-classes
Credential Access Technique c, Discovery Technique c
is also defined as
named individual

Network Socketc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Socket

Example
51.89.163.40:443
has super-classes
Identifier c, Observable c
has members
10.1.12.1:53 ni, 109.107.181.33:80 ni, 162.248.51.100:443 ni, 46.4.205.200:80 ni

Network Time Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTimeServer

has super-classes
Server c

Network Topologyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.004

has super-classes
Gather Victim Network Information c

Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTraffic

has super-classes
Digital Artifact c
has sub-classes
Administrative Network Traffic c, DHCP Network Traffic c, DNS Network Traffic c, File Transfer Network Traffic c, IPC Network Traffic c, Inbound Network Traffic c, Internet Network Traffic c, Intranet Network Traffic c, Mail Network Traffic c, Network Packet c, Network Session c, Outbound Network Traffic c, RPC Network Traffic c, TFTP Network Traffic c, Web Network Traffic c
is also defined as
named individual

Network Traffic Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTrafficAnalysis

has super-classes
Defensive Technique c
has sub-classes
Administrative Network Activity Analysis c, Byte Sequence Emulation c, Certificate Analysis c, Client-server Payload Profiling c, Connection Attempt Analysis c, DNS Traffic Analysis c, File Carving c, IPC Traffic Analysis c, Inbound Session Volume Analysis c, Network Traffic Community Deviation c, Per Host Download-Upload Ratio Analysis c, Protocol Metadata Anomaly Detection c, RPC Traffic Analysis c, Relay Pattern Analysis c, Remote Terminal Session Detection c
has members
Administrative Network Activity Analysis ni, Byte Sequence Emulation ni, Certificate Analysis ni, Client-server Payload Profiling ni, Connection Attempt Analysis ni, DNS Traffic Analysis ni, File Carving ni, IPC Traffic Analysis ni, Inbound Session Volume Analysis ni, Network Traffic Community Deviation ni, Per Host Download-Upload Ratio Analysis ni, Protocol Metadata Anomaly Detection ni, RPC Traffic Analysis ni, Relay Pattern Analysis ni, Remote Terminal Session Detection ni
is also defined as
named individual

Network Traffic Analysis Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTrafficAnalysisSoftware

has super-classes
Developer Application c
has members
Wireshark ni
is also defined as
named individual

Network Traffic Community Deviationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTrafficCommunityDeviation

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Network Traffic Filteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTrafficFiltering

has super-classes
Network Isolation c
has sub-classes
Inbound Traffic Filtering c, Outbound Traffic Filtering c
has members
Inbound Traffic Filtering ni, Outbound Traffic Filtering ni
is also defined as
named individual

Network Traffic Policy Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkTrafficPolicyMapping

has super-classes
Network Mapping c
is also defined as
named individual

Network Trust Dependenciesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1590.003

has super-classes
Gather Victim Network Information c

Network Vulnerability Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NetworkVulnerabilityAssessment

has super-classes
Network Mapping c
is also defined as
named individual

New Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1050

has super-classes
Persistence Technique c, Privilege Escalation Technique c

News Articlec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NewsArticle

has super-classes
Article c
has sub-classes
Internet Article c

NIST Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NISTControl

has super-classes
External Control c
has members
AC-17(8) ni, AC-2(1) ni, AC-2(13) ni, AC-2(2) ni, AC-2(3) ni, AC-2(4) ni, AC-2(5) ni, AC-2(6) ni, AC-2(7) ni, AC-2(9) ni, AC-23 ni, AC-24 ni, AC-24(1) ni, AC-24(2) ni, AC-3 ni, AC-3(11) ni, AC-3(13) ni, AC-3(3) ni, AC-3(7) ni, AC-3(8) ni, AC-4 ni, AC-4(1) ni, AC-4(10) ni, AC-4(11) ni, AC-4(12) ni, AC-4(13) ni, AC-4(14) ni, AC-4(15) ni, AC-4(17) ni, AC-4(19) ni, AC-4(20) ni, AC-4(21) ni, AC-4(26) ni, AC-4(27) ni, AC-4(28) ni, AC-4(29) ni, AC-4(3) ni, AC-4(30) ni, AC-4(32) ni, AC-4(4) ni, AC-4(5) ni, AC-4(6) ni, AC-4(8) ni, AC-5 ni, AC-6 ni, AC-6(1) ni, AC-6(10) ni, AC-6(3) ni, AC-6(4) ni, AC-6(5) ni, AC-6(6) ni, AC-6(9) ni, AC-7 ni, AC-7(3) ni, AC-7(4) ni, AU-10(5) ni, AU-14(2) ni, AU-15 ni, AU-2 ni, AU-2(1) ni, AU-2(2) ni, AU-3 ni, AU-4 ni, CM-14 ni, CM-5 ni, CM-5(1) ni, CM-5(3) ni, CM-5(5) ni, CM-5(6) ni, CM-6(3) ni, IA-2(1) ni, IA-2(2) ni, IA-2(4) ni, IA-2(6) ni, IR-4(12) ni, IR-4(13) ni, MA-3(3) ni, MA-3(4) ni, MA-3(5) ni, MA-3(6) ni, MA-4(1) ni, MA-6 ni, MA-6(1) ni, MA-6(2) ni, MA-6(3) ni, RA-3(3) ni, RA-3(4) ni, RA-5 ni, RA-5(2) ni, RA-5(3) ni, RA-5(4) ni, RA-5(5) ni, RA-5(6) ni, RA-5(7) ni, SA-10(1) ni, SA-10(3) ni, SA-10(4) ni, SA-10(5) ni, SA-10(6) ni, SA-11(1) ni, SA-11(8) ni, SA-8(18) ni, SA-8(22) ni, SC-2 ni, SC-2(1) ni, SC-3 ni, SC-3(1) ni, SI-2(4) ni, SI-2(5) ni, SI-2(6) ni, SI-3 ni, SI-3(10) ni, SI-3(4) ni, SI-3(8) ni, SI-4 ni, SI-4(2) ni, SI-4(4) ni

NIST SP 800-53 Control Catalogc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NISTSP800-53ControlCatalog

has super-classes
Control Catalog c
has members
NIST SP 800-53 R3 ni, NIST SP 800-53 R4 ni, NIST SP 800-53 R5 ni

Non-Application Layer Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1095

has super-classes
Command and Control Technique c
is also defined as
named individual

Non-exit on Failed Initializationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-455

has super-classes
Improper Initialization c, Incorrect Control Flow Scoping c, Not Failing Securely ('Failing Open') c

Non-monotonic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Non-monotonicLogic

has super-classes
Symbolic AI c
is also defined as
named individual

Non-Parametric Testsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Non-ParametricTests

has super-classes
Hypothesis Testing c
is also defined as
named individual

Non-Replicating Malicious Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-508

has super-classes
Trojan Horse c

Non-SQL Invokable Control Element with Excessive Number of Data Resource Accessesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1073

has super-classes
Asymmetric Resource Consumption (Amplification) c

Non-Standard Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1132.002

has super-classes
Data Encoding c

Non-Standard Portc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1571

has super-classes
Command and Control Technique c
is also defined as
named individual

Non-Transparent Sharing of Microarchitectural Resourcesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1303

has super-classes
Improper Isolation of Shared Resources on System-on-a-Chip (SoC) c, Observable Discrepancy c

Nonlinear Regressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NonlinearRegression

has super-classes
Regression Analysis c
is also defined as
named individual

Nonlinear Regression Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NonlinearRegressionLearning

has super-classes
Regression Analysis Learning c
is also defined as
named individual

Not Failing Securely ('Failing Open')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-636

has super-classes
Improper Handling of Exceptional Conditions c, Violation of Secure Design Principles c
has sub-classes
Non-exit on Failed Initialization c

Not Using Complete Mediationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-638

has super-classes
Missing Authorization c, Violation of Secure Design Principles c
has sub-classes
Improper Protection of Alternate Path c

Not Using Password Agingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-262

has super-classes
Weak Authentication c

NPM Packagec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/NPMPackage

has super-classes
Mekanoid Thing c, Software Package c
has members
@keep-network/tbtc-v2 ni

NTDSc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.003

has super-classes
OS Credential Dumping c
is also defined as
named individual

NTFS File Attributesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1096

has super-classes
Defense Evasion Technique c

NTFS File Attributesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.004

has super-classes
Hide Artifacts c
is also defined as
named individual

NTFS Junction Pointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NTFSJunctionPoint

Is defined by
http://dbpedia.org/resource/NTFS_links
has super-classes
NTFS Link c, Symbolic Link c

Null Byte Interaction Error (Poison Null Byte)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-626

has super-classes
Improper Neutralization of Input Terminators c, Interpretation Conflict c

NULL Pointer Dereferencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-476

has super-classes
Improper Adherence to Coding Standards c, Improper Check for Unusual or Exceptional Conditions c
has sub-classes
Unchecked Return Value to NULL Pointer Dereference c
is also defined as
named individual

Numeric Pattern Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#NumericPatternMatching

has super-classes
Pattern Matching c
has sub-classes
Exact Matching c, Range Matching c
is also defined as
named individual

Numeric Range Comparison Without Minimum Checkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-839

has super-classes
Incomplete Comparison with Missing Factors c

Numeric Truncation Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-197

has super-classes
Incorrect Conversion between Numeric Types c

Obfuscated Files or Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027

has super-classes
Defense Evasion Technique c
has sub-classes
Binary Padding c, Compile After Delivery c, HTML Smuggling c, Indicator Removal from Tools c, Software Packing c, Steganography c

Object Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ObjectFile

has super-classes
File c
has sub-classes
Kernel Module c, Shared Library File c
is also defined as
named individual

Object Model Violation: Just One of Equals and Hashcode Definedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-581

has super-classes
Improper Following of Specification by Caller c, Incorrect Comparison c

Obscured Security-relevant Information by Alternate Namec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-224

has super-classes
Information Loss or Omission c

Observablec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Observable

A notable string value useful which may offer helpful hints to during cybersecurity investigations.
has super-classes
Mekanoid Thing c
has sub-classes
Email Address c, Email Sender c, Email Subject c, File Name c, MAC Address c, Network Socket c, Username c, path c
is in domain of
is dp

Observable Behavioral Discrepancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-205

has super-classes
Observable Discrepancy c
has sub-classes
Observable Behavioral Discrepancy With Equivalent Products c, Observable Internal Behavioral Discrepancy c

Observable Behavioral Discrepancy With Equivalent Productsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-207

has super-classes
Observable Behavioral Discrepancy c

Observable Discrepancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-203

has super-classes
Exposure of Sensitive Information to an Unauthorized Actor c
has sub-classes
Improper Protection of Physical Side Channels c, Non-Transparent Sharing of Microarchitectural Resources c, Observable Behavioral Discrepancy c, Observable Response Discrepancy c, Observable Timing Discrepancy c

Observable Internal Behavioral Discrepancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-206

has super-classes
Observable Behavioral Discrepancy c

Observable Response Discrepancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-204

has super-classes
Observable Discrepancy c

Observable Timing Discrepancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-208

has super-classes
Observable Discrepancy c
has sub-classes
Incorrect Comparison Logic Granularity c

Obsolete Feature in UIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-448

has super-classes
UI Discrepancy for Security Feature c

Obtain Capabilitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588

has super-classes
Resource Development Technique c
has sub-classes
Code Signing Certificates c, Digital Certificates c, Exploits c, Malware c, Tool c, Vulnerabilities c

Odbcconf Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.008

has super-classes
Signed Binary Proxy Execution c

Off-by-one Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-193

has super-classes
Incorrect Calculation c

Offensive Tacticc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OffensiveTactic

Is defined by
https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf
has super-classes
ATTACK Thing c
has sub-classes
Collection c, Command And Control c, Credential Access c, Defense Evasion c, Discovery c, Execution c, Exfiltration c, Impact c, Initial Access c, Lateral Movement c, Persistence c, Privilege Escalation c, Reconnaissance c, Resource Development c
has members
Collection ni, Command And Control ni, Credential Access ni, Defense Evasion ni, Discovery ni, Execution ni, Exfiltration ni, Impact ni, Initial Access ni, Lateral Movement ni, Persistence ni, Privilege Escalation ni

Offensive Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OffensiveTechnique

Is defined by
https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf
has super-classes
ATTACK Thing c, Technique c
has sub-classes
Collection Technique c, Command and Control Technique c, Credential Access Technique c, Defense Evasion Technique c, Discovery Technique c, Execution Technique c, Exfiltration Technique c, Impact Technique c, Initial Access Technique c, Lateral Movement Technique c, Persistence Technique c, Privilege Escalation Technique c, Reconnaissance Technique c, Resource Development Technique c
is in domain of
attack-id, attack-kb-annotation
is in range of
may-be-tactically-associated-with op

Office Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OfficeApplication

has super-classes
User Application c
is also defined as
named individual

Office Application Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OfficeApplicationFile

has super-classes
Document File c
is also defined as
named individual

Office Application Startupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137

has super-classes
Persistence Technique c
has sub-classes
Add-ins c, Office Template Macros c, Office Test c, Outlook Forms c, Outlook Home Page c, Outlook Rules c

Office Template Macrosc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.001

has super-classes
Office Application Startup c
is also defined as
named individual

Office Testc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.002

has super-classes
Office Application Startup c
is also defined as
named individual

Omission of Security-relevant Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-223

has super-classes
Information Loss or Omission c
has sub-classes
Insufficient Logging c

Omitted Break Statement in Switchc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-484

has super-classes
Always-Incorrect Control Flow Implementation c, Improper Adherence to Coding Standards c

On-Chip Debug and Test Interface With Improper Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1191

has super-classes
Improper Access Control c

One-time Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#One-timePassword

has super-classes
Credential Hardening c
is also defined as
named individual

One-Way Communicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1102.003

has super-classes
Web Service c

Only Filtering One Instance of a Special Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-793

has super-classes
Incomplete Filtering of One or More Instances of Special Elements c

Only Filtering Special Elements at a Specified Locationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-795

has super-classes
Incomplete Filtering of Special Elements c
has sub-classes
Only Filtering Special Elements Relative to a Marker c, Only Filtering Special Elements at an Absolute Position c

Only Filtering Special Elements at an Absolute Positionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-797

has super-classes
Only Filtering Special Elements at a Specified Location c

Only Filtering Special Elements Relative to a Markerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-796

has super-classes
Only Filtering Special Elements at a Specified Location c

Open Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OpenFile

has super-classes
System Call c
is also defined as
named individual

Open Source Licensec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OpenSourceLicense

has super-classes
License c

Open-source Developerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Open-sourceDeveloper

has super-classes
Product Developer c
has members
Wireshark Foundation ni

Operating Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystem

has super-classes
Digital Artifact c
has members
Windows 11 ni, windows 10 1607 ni
is also defined as
named individual

Operating System Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemConfiguration

has super-classes
Configuration Resource c
has sub-classes
Operating System Configuration Component c
is also defined as
named individual

Operating System Configuration Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemConfigurationComponent

has super-classes
Operating System Configuration c
has sub-classes
System Configuration Database Record c, System Firewall Configuration c, System Init Configuration c
is also defined as
named individual

Operating System Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemConfigurationFile

has super-classes
Configuration File c, Operating System File c
is also defined as
named individual

Operating System Executable Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemExecutableFile

has super-classes
Operating System File c
is also defined as
named individual

Operating System Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemFile

has super-classes
File c
has sub-classes
Operating System Configuration File c, Operating System Executable File c, Operating System Log File c, Operating System Shared Library File c
is also defined as
named individual

Operating System Log Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemLogFile

has super-classes
Log File c, Operating System File c
is also defined as
named individual

Operating System Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemMonitoring

has super-classes
Platform Monitoring c
has sub-classes
Endpoint Health Beacon c, Input Device Analysis c, Memory Boundary Tracking c, Scheduled Job Analysis c, System Daemon Monitoring c, System File Analysis c, System Init Config Analysis c, User Session Init Config Analysis c
has members
Endpoint Health Beacon ni, Input Device Analysis ni, Memory Boundary Tracking ni, Scheduled Job Analysis ni, System Daemon Monitoring ni, System File Analysis ni, System Init Config Analysis ni, User Session Init Config Analysis ni
is also defined as
named individual

Operating System Packaging Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemPackagingTool

has super-classes
Software Packaging Tool c

Operating System Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemProcess

has super-classes
Process c
has sub-classes
Scheduled Job c, System Init Process c
is also defined as
named individual

Operating System Shared Library Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperatingSystemSharedLibraryFile

has super-classes
Operating System File c, Shared Library File c
is also defined as
named individual

Operationc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Operation

has super-classes
Mekanoid Thing c

Operation on a Resource after Expiration or Releasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-672

has super-classes
Operation on Resource in Wrong Phase of Lifetime c
has sub-classes
Expired Pointer Dereference c, Improper Validation of Certificate Expiration c, Insufficient Session Expiration c, Use of Expired File Descriptor c, Use of a Key Past its Expiration Date c

Operation on Resource in Wrong Phase of Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-666

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created c, Double Free c, Multiple Binds to the Same Port c, Operation on a Resource after Expiration or Release c, Premature Release of Resource During Expected Lifetime c

Operational Activity Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperationalActivityMapping

has super-classes
Defensive Technique c
has sub-classes
Access Modeling c, Operational Dependency Mapping c, Operational Risk Assessment c, Organization Mapping c
has members
Access Modeling ni, Operational Dependency Mapping ni, Operational Risk Assessment ni, Organization Mapping ni
is also defined as
named individual

Operational Dependency Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperationalDependencyMapping

has super-classes
Operational Activity Mapping c
is also defined as
named individual

Operational Risk Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperationalRiskAssessment

has super-classes
Operational Activity Mapping c
is also defined as
named individual

Operations Center Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OperationsCenterComputer

Is defined by
http://dbpedia.org/resource/Mainframe_computer
has super-classes
Shared Computer c

Operator Precedence Logic Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-783

has super-classes
Always-Incorrect Control Flow Implementation c

Optical Modemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OpticalModem

Is defined by
http://dbpedia.org/resource/Modem#Optical_modem
has super-classes
Modem c

Orchestration Controllerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OrchestrationController

has super-classes
Orchestration Server c
is also defined as
named individual

Orchestration Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OrchestrationServer

has super-classes
Server c
has sub-classes
Orchestration Controller c, Orchestration Worker c

Orchestration Workerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OrchestrationWorker

has super-classes
Orchestration Server c

Organizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Organization

has super-classes
Agent c
has sub-classes
Provider c
has members
DISA FSO ni, Mekanoid Corporation ni
is also defined as
named individual

Organization Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OrganizationMapping

has super-classes
Operational Activity Mapping c
is also defined as
named individual

Organizational Activityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OrganizationalActivity

has super-classes
Activity c
is also defined as
named individual

Origin Validation Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-346

has super-classes
Improper Access Control c, Insufficient Verification of Data Authenticity c
has sub-classes
Missing Origin Validation in WebSockets c

OS API Allocate Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIAllocateMemory

has super-classes
OS API Function c
has sub-classes
Linux Mmap c, Linux Mmap2 c, Windows NtAllocateVirtualMemory c, Windows NtAllocateVirtualMemoryEx c
is also defined as
named individual

OS API Connect Socketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIConnectSocket

has super-classes
OS API Function c
has sub-classes
Linux Connect c, Linux Socketcall Argument SYS_CONNECT c
is also defined as
named individual

OS API Copy Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPICopyToken

has super-classes
OS API Function c
has sub-classes
Windows NtDuplicateToken c
is also defined as
named individual

OS API Create Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPICreateFile

has super-classes
OS API Function c
has sub-classes
Linux Creat c, Linux Open Argument O_CREAT c, Linux OpenAt Argument O_CREAT c, Linux OpenAt2 Argument O_CREAT c, Windows NtCreateFile c, Windows NtCreateMailslotFile c, Windows NtCreateNamedPipeFile c, Windows NtCreatePagingFile c
is also defined as
named individual

OS API Create Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPICreateProcess

has super-classes
OS API Function c
has sub-classes
Linux Clone c, Linux Clone3 c, Linux Fork c, Linux Vfork c, Windows NtCreateProcess c, Windows NtCreateProcessEx c
is also defined as
named individual

OS API Create Socketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPICreateSocket

has super-classes
OS API Function c
has sub-classes
Linux Socket c, Linux Socketcall Argument SYS_SOCKET c
is also defined as
named individual

OS API Create Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPICreateThread

has super-classes
OS API Function c
has sub-classes
Linux Clone Argument CLONE_THREAD c, Linux Clone3 Argument CLONE_THREAD c, Windows NtCreateThread c, Windows NtCreateThreadEx c
is also defined as
named individual

OS API Delete Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIDeleteFile

has super-classes
OS API Function c
has sub-classes
Linux Unlink c, Linux Unlinkat c, Windows NtDeleteFile c, Windows NtSetInformationFile Argument FileDispositionInformation c
is also defined as
named individual

OS API Execc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIExec

has super-classes
OS API Function c
has sub-classes
Linux Execve c, Linux Execveat c
is also defined as
named individual

OS API Free Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIFreeMemory

has super-classes
OS API Function c
has sub-classes
Linux Munmap c, Windows NtFreeVirtualMemory c
is also defined as
named individual

OS API Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIFunction

has super-classes
Software c
has sub-classes
OS API Allocate Memory c, OS API Connect Socket c, OS API Copy Token c, OS API Create File c, OS API Create Process c, OS API Create Socket c, OS API Create Thread c, OS API Delete File c, OS API Exec c, OS API Free Memory c, OS API Get System Time c, OS API Move File c, OS API Open File c, OS API Read File c, OS API Suspend Process c, OS API Suspend Thread c, OS API Terminate Process c, OS API Trace Process c, OS API Write File c

OS API Get System Timec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIGetSystemTime

has super-classes
OS API Function c
has sub-classes
Linux Time c, Windows NtQuerySystemTime c
is also defined as
named individual

OS API Move Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIMoveFile

has super-classes
OS API Function c
has sub-classes
Linux Rename c, Linux Renameat c, Linux Renameat2 c
is also defined as
named individual

OS API Open Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIOpenFile

has super-classes
OS API Function c
has sub-classes
Linux Open Argument O_RDONLY, O_WRONLY, O_RDWR c, Linux OpenAt Argument O_RDONLY, O_WRONLY, O_RDWR c, Linux OpenAt2 Argument O_RDONLY, O_WRONLY, O_RDWR c, Windows NtOpenFile c
is also defined as
named individual

OS API Private Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIPrivateFunction

has super-classes
Software c
has sub-classes
Windows NtAllocateVirtualMemory c, Windows NtAllocateVirtualMemoryEx c, Windows NtCreateFile c, Windows NtCreateMailslotFile c, Windows NtCreateNamedPipeFile c, Windows NtCreatePagingFile c, Windows NtCreateProcess c, Windows NtCreateProcessEx c, Windows NtCreateThread c, Windows NtCreateThreadEx c, Windows NtDeleteFile c, Windows NtDuplicateToken c, Windows NtFreeVirtualMemory c, Windows NtOpenFile c, Windows NtOpenProcess c, Windows NtQuerySystemTime c, Windows NtReadFile c, Windows NtReadFileScatter c, Windows NtSetInformationFile Argument FileDispositionInformation c, Windows NtSuspendProcess c, Windows NtSuspendThread c, Windows NtTerminateProcess c, Windows NtWriteFile c, Windows NtWriteFileGather c

OS API Read Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIReadFile

has super-classes
OS API Function c
has sub-classes
Linux Read c, Linux Readv c, Windows NtReadFile c, Windows NtReadFileScatter c
is also defined as
named individual

OS API Suspend Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPISuspendProcess

has super-classes
OS API Function c
has sub-classes
Linux Pause Process c, Linux Ptrace Argument PTRACE_INTERRUPT c, Windows NtSuspendProcess c
is also defined as
named individual

OS API Suspend Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPISuspendThread

has super-classes
OS API Function c
has sub-classes
Linux Pause Thread c, Windows NtSuspendThread c
is also defined as
named individual

OS API Terminate Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPITerminateProcess

has super-classes
OS API Function c
has sub-classes
Linux Kill Argument SIGKILL c, Linux _Exit c, Windows NtTerminateProcess c
is also defined as
named individual

OS API Trace Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPITraceProcess

has super-classes
OS API Function c
has sub-classes
Linux Ptrace Argument PTRACE_TRACEME c, Windows NtOpenProcess c
is also defined as
named individual

OS API Write Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OSAPIWriteFile

has super-classes
OS API Function c
has sub-classes
Linux Write c, Linux Writev c, Windows NtWriteFile c, Windows NtWriteFileGather c
is also defined as
named individual

OS Credential Dumpingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003

has super-classes
Credential Access Technique c
has sub-classes
/etc/passwd and /etc/shadow c, Cached Domain Credentials c, DCSync c, LSA Secrets c, LSASS Memory c, NTDS c, Proc Filesystem c, Security Account Manager c

OS Exhaustion Floodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1499.001

has super-classes
Endpoint Denial of Service c

Out-of-bounds Readc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-125

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Buffer Over-read c, Buffer Under-read c
is also defined as
named individual

Out-of-bounds Writec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-787

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c
has sub-classes
Buffer Underwrite ('Buffer Underflow') c, Heap-based Buffer Overflow c, Stack-based Buffer Overflow c, Write-what-where Condition c
is also defined as
named individual

Outbound Internet DNS Lookup Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetDNSLookupTraffic

has super-classes
DNS Network Traffic c, Outbound Internet Network Traffic c, Outbound Network Traffic c
is also defined as
named individual

Outbound Internet Encrypted Remote Terminal Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetEncryptedRemoteTerminalTraffic

has super-classes
Outbound Internet Encrypted Traffic c
is also defined as
named individual

Outbound Internet Encrypted Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetEncryptedTraffic

has super-classes
Outbound Internet Network Traffic c
has sub-classes
Outbound Internet Encrypted Remote Terminal Traffic c, Outbound Internet Encrypted Web Traffic c
is also defined as
named individual

Outbound Internet Encrypted Web Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetEncryptedWebTraffic

has super-classes
Outbound Internet Encrypted Traffic c, Outbound Internet Web Traffic c
is also defined as
named individual

Outbound Internet File Transfer Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetFileTransferTraffic

has super-classes
File Transfer Network Traffic c, Outbound Internet Network Traffic c, Outbound Network Traffic c
is also defined as
named individual

Outbound Internet Mail Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetMailTraffic

has super-classes
Outbound Internet Network Traffic c
is also defined as
named individual

Outbound Internet Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetNetworkTraffic

has super-classes
Internet Network Traffic c, Outbound Network Traffic c
has sub-classes
Outbound Internet DNS Lookup Traffic c, Outbound Internet Encrypted Traffic c, Outbound Internet File Transfer Traffic c, Outbound Internet Mail Traffic c, Outbound Internet RPC Traffic c, Outbound Internet Web Traffic c
is also defined as
named individual

Outbound Internet RPC Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetRPCTraffic

has super-classes
Outbound Internet Network Traffic c, Outbound Network Traffic c, RPC Network Traffic c

Outbound Internet Web Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundInternetWebTraffic

has super-classes
Outbound Internet Network Traffic c, Web Network Traffic c
has sub-classes
Outbound Internet Encrypted Web Traffic c
is also defined as
named individual

Outbound Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Outbound Internet DNS Lookup Traffic c, Outbound Internet File Transfer Traffic c, Outbound Internet Network Traffic c, Outbound Internet RPC Traffic c
is also defined as
named individual

Outbound Traffic Filteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutboundTrafficFiltering

has super-classes
Network Traffic Filtering c
is also defined as
named individual

Outlook Formsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.003

has super-classes
Office Application Startup c
is also defined as
named individual

Outlook Home Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.004

has super-classes
Office Application Startup c
is also defined as
named individual

Outlook Rulesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1137.005

has super-classes
Office Application Startup c
is also defined as
named individual

Output Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OutputDevice

Is defined by
http://dbpedia.org/resource/Output_device
has super-classes
Hardware Device c
has sub-classes
Display Adapter c

Overly Restrictive Account Lockout Mechanismc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-645

has super-classes
Improper Authentication c

Overly Restrictive Regular Expressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-186

has super-classes
Incorrect Regular Expression c

OWLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#OWL

has super-classes
Description Logic c
is also defined as
named individual

Packet Logc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PacketLog

has super-classes
Log c
has members
conn.log ni
is also defined as
named individual

Pagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Page

Is defined by
https://dbpedia.org/page/Page_(computer_memory)
has super-classes
Memory Block c

Page Framec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PageFrame

has super-classes
Memory Block c
is also defined as
named individual

Page Tablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PageTable

has super-classes
Digital Artifact c
is also defined as
named individual

Parameter-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Parameter-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Parametric Testsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ParametricTests

has super-classes
Hypothesis Testing c
is also defined as
named individual

Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1045

has super-classes
Insufficient Adherence to Expected Conventions c

Parent Class with References to Child Classc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1062

has super-classes
Insufficient Encapsulation c

Parent Class without Virtual Destructor Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1079

has super-classes
Insufficient Adherence to Expected Conventions c

Parent PID Spoofingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134.004

has super-classes
Access Token Manipulation c
is also defined as
named individual

Parent PID Spoofingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1502

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c

Parent Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ParentProcess

Is defined by
http://dbpedia.org/resource/Parent_process
has super-classes
Process c

Partial Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PartialMatching

has super-classes
String Pattern Matching c
has sub-classes
Approximate String Matching c, Regex Matching c, Soundex Matching c, Substring Matching c
is also defined as
named individual

Partial String Comparisonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-187

has super-classes
Incomplete Comparison with Missing Factors c

Partitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Partition

has super-classes
Digital Artifact c
is also defined as
named individual

Partition Tablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PartitionTable

has super-classes
Digital Artifact c
is also defined as
named individual

Pass the Hashc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1075

has super-classes
Lateral Movement Technique c

Pass The Hashc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1550.002

has super-classes
Use Alternate Authentication Material c
is also defined as
named individual

Pass the Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1097

has super-classes
Lateral Movement Technique c

Pass The Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1550.003

has super-classes
Use Alternate Authentication Material c
is also defined as
named individual

Passing Mutable Objects to an Untrusted Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-374

has super-classes
Exposure of Resource to Wrong Sphere c

Passive Certificate Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PassiveCertificateAnalysis

has super-classes
Certificate Analysis c
has members
Passive Certificate Analysis ni
is also defined as
named individual

Passive Logical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PassiveLogicalLinkMapping

has super-classes
Logical Link Mapping c
is also defined as
named individual

Passive Physical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PassivePhysicalLinkMapping

has super-classes
Physical Link Mapping c
is disjoint with
Active Physical Link Mapping c
is also defined as
named individual

Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Password

has super-classes
Credential c
has sub-classes
Encrypted Password c
is also defined as
named individual

Password Aging with Long Expirationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-263

has super-classes
Weak Authentication c

Password Crackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1110.002

has super-classes
Brute Force c
is also defined as
named individual

Password Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PasswordDatabase

has super-classes
Database c
has sub-classes
Password File c, Password Store c, System Password Database c

Password Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PasswordFile

has super-classes
File c, Password Database c
is also defined as
named individual

Password Filter DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1174

has super-classes
Credential Access Technique c

Password Filter DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556.002

has super-classes
Modify Authentication Process c
is also defined as
named individual

Password Guessingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1110.001

has super-classes
Brute Force c
is also defined as
named individual

Password in Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-260

has super-classes
Insufficiently Protected Credentials c
has sub-classes
ASP.NET Misconfiguration: Password in Configuration File c, Empty Password in Configuration File c, J2EE Misconfiguration: Plaintext Password in Configuration File c

Password Managerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PasswordManager

Is defined by
http://dbpedia.org/resource/Password_manager
has super-classes
Application c

Password Managersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555.005

has super-classes
Credentials from Password Stores c

Password Policy Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1201

has super-classes
Discovery Technique c

Password Sprayingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1110.003

has super-classes
Brute Force c
is also defined as
named individual

Password Storec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PasswordStore

has super-classes
Password Database c
has sub-classes
In-memory Password Store c, MacOS Keychain c
is also defined as
named individual

Patch System Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1601.001

has super-classes
Modify System Image c

Patentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Patent

has super-classes
Document c
is also defined as
named individual

Patent Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PatentReference

has super-classes
Technique Reference c
has members
Reference - Account monitoring - Forescout Technologies ni, Reference - Active firewall system and methodology - McAfee LLC ni, Reference - Advanced device matching system ni, Reference - Anomaly Detection Using Adaptive Behavioral Profiles - Securonix Inc ni, Reference - Anti-tamper system with self-adjusting guards - ARXAN TECHNOLOGIES Inc ni, Reference - Apparatus for to provide content to and query a reverse domain name system server - Barrracuda Networks ni, Reference - Approaches for securing an internet endpoint using fine-grained operating system virtualization - Bromium, Inc. ni, Reference - Architecture of transparent network security for application containers - Neuvector Inc ni, Reference - Automated computer vulnerability resolution system ni, Reference - Automatically generating network resource groups and assigning customized decoy policies thereto - Illusive Networks Ltd ni, Reference - Automatically generating rules for connection security - Microsoft ni, Reference - Biometric Challenge-Response Authentication - Accenture ni, Reference - Broadcast isolation and level 3 network switch - Hewlett Packard Enterprise Development LP ni, Reference - Computational modeling and classification of data streams - Crowdstrike Inc ni, Reference - Computer Worm Defense System and Method - FireEye Inc ni, Reference - Computer motherboard having peripheral security functions ni, Reference - Computer-implemented methods and systems for identifying visually similar text character strings - Greathorn Inc ni, Reference - Computing apparatus with automatic integrity reference generation and maintenance - Tripwire, Inc. ni, Reference - Content extractor and analysis system - Bit 9 Inc, Carbon Black Inc ni, Reference - Cyber vaccine and predictive-malware-defense methods and systems ni, Reference - Data processing and scanning systems for generating and populating a data inventory ni, Reference - Database for receiving, storing and compiling information about email messages ni, Reference - Deception-Based Responses to Security Attacks - Crowdstrike Inc ni, Reference - Decoy Network-Based Service for Deceiving Attackers - Amazon Technologies ni, Reference - Decoy and deceptive data object technology - Cymmetria Inc ni, Reference - Decoy and deceptive data object technology - Cymmetria, Inc. ni, Reference - Detecting network reconnaissance by tracking intranet dark-net communications - VECTRA NETWORKS Inc ni, Reference - Detecting script-based malware - Crowdstrike Inc ni, Reference - Deterministic method for detecting and blocking of exploits on interpreted code - K2 Cyber Security Inc ni, Reference - Distributed meta-information query in a network - Bit 9 Inc ni, Reference - Domain age registration alert - Inc Rapid7 Inc RAPID7 Inc ni, Reference - Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network - Palo Alto Networks Inc ni, Reference - Embedding contexts for on-line threats into response policy zones - Verisign Inc ni, Reference - End-to-end certificate pinning ni, Reference - File-modifying malware detection - Crowdstrike Inc ni, Reference - Finding phishing sites ni, Reference - Firewall for interent access - Secure Computing LLC ni, Reference - Firewall for processing a connectionless network packet - National Security Agency ni, Reference - Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network - National Security Agency ni, Reference - Firewalls that filter based upon protocol commands - Intel Corp ni, Reference - Firmware Embedded Monitoring Code Red Balloon ni, Reference - Firmware Verification Eclypsium ni, Reference - Firmware Verification Trapezoid ni, Reference - Framework for notifying a directory service of authentication events processed outside the directory service - Oracle International Corp ni, Reference - Guards for application in software tamperproofing - Purdue Research Foundation ni, Reference - Hardware-assisted system and method for detecting and analyzing system calls made to an operting system kernel - Endgame Inc ni, Reference - Heuristic botnet detection - Palo Alto Networks Inc ni, Reference - Host intrusion prevention system using software and user behavior analysis - Sophos Ltd ni, Reference - Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views ni, Reference - Identification of traceroute nodes and associated devices ni, Reference - Identification of visual international domain name collisions - Verisign Inc ni, Reference - Identifying a denial-of-service attack in a cloud-based proxy service - Cloudfare Inc. ni, Reference - Inferential exploit attempt detection - Crowdstrike Inc ni, Reference - Instant process termination tool to recover control of an information handling system - Dell Products LP ni, Reference - Integrity assurance through early loading in the boot phase - Crowdstrike Inc ni, Reference - Intrusion detection using a heartbeat - Sophos Ltd ni, Reference - Isolation of applications within a virtual machine - Bromium, Inc. ni, Reference - Malicious relay detection on networks - VECTRA NETWORKS Inc ni, Reference - Malware analysis system - Palo Alto Networks Inc ni, Reference - Malware detection in event loops - Crowdstrike Inc ni, Reference - Malware detection using local computational models - Crowdstrike Inc ni, Reference - Method and Apparatus for Detecting Malicious Websites - Endgame Inc ni, Reference - Method and Apparatus for Network Fraud Detection and Remediation Through Analytics - Idaptive LLC ni, Reference - Method and apparatus for increasing the speed at which computer viruses are detected - McAfee LLC ni, Reference - Method and apparatus for utilizing a token for resource access - Rsa Security Inc. ni, Reference - Method and system for UDP flood attack detection - Riorey LLC ni, Reference - Method and system for controlling communication ports ni, Reference - Method and system for detecting algorithm-generated domains - VECTRA NETWORKS Inc ni, Reference - Method and system for detecting external control of compromised hosts - VECTRA NETWORKS Inc ni, Reference - Method and system for detecting malicious payloads - Vectra Networks Inc ni, Reference - Method and system for detecting restricted content associated with retrieved content - Sophos Ltd ni, Reference - Method and system for detecting suspicious administrative activity - Vectra Networks Inc ni, Reference - Method and system for detecting threats using metadata vectors - VECTRA NETWORKS Inc ni, Reference - Method and system for detecting threats using passive cluster mapping - Vectra Networks Inc ni, Reference - Method and system for providing software updates to local machines ni, Reference - Method for controlling computer network security - Checkpoint Software Technologies Ltd ni, Reference - Method for file encryption ni, Reference - Method using kernel mode assistance for the detection and removal of threats which are actively preventing detection and removal from a running system - Symantec Corporation ni, Reference - Mock attack cybersecurity training system and methods - WOMBAT SECURITY TECHNOLOGIES Inc ni, Reference - Modeling user access to computer resources - Daedalus Group LLC (formerly IBM) ni, Reference - Modification of a Server to Mimic a Deception Mechanism - Acalvio Technologies Inc ni, Reference - Network firewall with proxy - Secure Computing LLC ni, Reference - Open source intelligence deceptions - Illusive Networks Ltd ni, Reference - Post sandbox methods and systems for detecting and blocking zero-day exploits via api call validation - K2 Cyber Security Inc ni, Reference - Preventing execution of task scheduled malware - McAfee LLC ni, Reference - Privacy and security systems and methods of use ni, Reference - Private virtual local area network isolation - Cisco Technology Inc ni, Reference - Protected computing environment - Microsoft Technology Licensing LLC ni, Reference - Protecting against distributed denial of service attacks - Cisco Technology Inc. ni, Reference - Protecting against distributed network flood attacks - Juniper Networks Inc. ni, Reference - Public Key Pinning Extension for HTTP ni, Reference - RPC call interception - Crowdstrike Inc ni, Reference - Reputation of an entity associated with a content item ni, Reference - Secure caching of server credentials - Dell Products LP ni, Reference - Security System with Methodology for Interprocess Communication Control - Check Point Software Tech Inc ni, Reference - Security vulnerability information aggregation ni, Reference - Sinkholing bad network domains by registering the bad network domains on the internet - Palo Alto Networks Inc ni, Reference - Software vulnerability graph database ni, Reference - Supply chain cyber-deception - Cymmetria, Inc. ni, Reference - Synchronizing a honey network configuration to reflect a target network environment - Palo Alto Networks Inc ni, Reference - System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis - Silver Tail Systems ni, Reference - System and Method for Network Security Including Detection of Attacks Through Partner Websites - EMC IP Holding Co LLC ni, Reference - System and Method for Process Hollowing Detection - Carbon Black Inc ni, Reference - System and a method for identifying the presence of malware and ransomware using mini-traps set at network endpoints - Fidelis Cybersecurity Solutions Inc ni, Reference - System and method for detecting homoglyph attacks with a siamese convolutional neural network - Endgame Inc ni, Reference - System and method for detecting malware injected into memory of a computing device - Endgame Inc ni, Reference - System and method for identifying the presence of malware using mini-traps set at network endpoints - Fidelis Cybersecurity Solutions Inc ni, Reference - System and method for internet security - Cylance Inc ni, Reference - System and method for managed security assessment and mitigation ni, Reference - System and method for providing an actively invalidated client-side network resource cache - IMVU ni, Reference - System and method for providing anonymous remailing and filtering of electronic mail - Nokia ni, Reference - System and method for scanning remote services to locate stored objects with malware ni, Reference - System and method for validating in-memory integrity of executable files to identify malicious activity - Endgame Inc ni, Reference - System and method for vulnerability risk analysis ni, Reference - System and method thereof for identifying and responding to security incidents based on preemptive forensics - Palo Alto Networks Inc ni, Reference - System and methods thereof for causality identification and attributions determination of processes in a network - Palo Alto Networks IncCyber Secdo Ltd ni, Reference - System and methods thereof for detection of persistent threats in a computerized environment background - Palo Alto Networks IncCyber Secdo Ltd ni, Reference - System and methods thereof for identification of suspicious system processes - Palo Alto Networks Inc ni, Reference - System and methods thereof for logical identification of malicious threats across a plurality of end-point devices (epd) communicatively connected by a network - Palo Alto Networks IncCyber Secdo Ltd ni, Reference - System and methods thereof for preventing ransomware from encrypting data elements stored in a memory of a computer-based system - Palo Alto Networks Inc ni, Reference - System for detecting threats using scenario-based tracking of internal and external network traffic - VECTRA NETWORKS Inc ni, Reference - System for implementing threat detection using daily network traffic community outliers - VECTRA NETWORKS Inc ni, Reference - System for implementing threat detection using threat and risk assessment of asset-actor interactions - VECTRA NETWORKS Inc ni, Reference - System, method, and computer program product for detecting and assessing security risks in a network - Exabeam Inc ni, Reference - Systems and methods for detecting and/or handling targeted attacks in the email channel - Graphus Inc ni, Reference - Systems and methods for detecting credential theft - Symantec Corp ni, Reference - Tamper proof mutating software - ARXAN TECHNOLOGIES Inc ni, Reference - Techniques for impeding and detecting network threats - Verisign Inc ni, Reference - Threat detection for return oriented programming - Crowdstrike Inc ni, Reference - Threat detection through the accumulated detection of threat characteristics - Sophos Ltd ni, Reference - Tokenless biometric transaction authorization method and system ni, Reference - Trusted Communications With Child Processes - Microsoft Technology Licensing LLC ni, Reference - USB filter for hub malicious code prevention system ni, Reference - Use of an application controller to monitor and control software file and application environments - Sophos Ltd ni, Reference - Using spanning tree protocol (STP) to enhance layer-2 topology maps ni, Reference - Virtualized process isolation - Advanced Micro Devices Inc ni

pathc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Path

has super-classes
Observable c

Path Equivalence: ' filename' (Leading Space)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-47

has super-classes
Improper Resolution of Path Equivalence c

Path Equivalence: '/./' (Single Dot Directory)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-55

has super-classes
Improper Resolution of Path Equivalence c

Path Equivalence: '//multiple/leading/slash'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-50

has super-classes
Improper Neutralization of Multiple Leading Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: '/multiple//internal/slash'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-51

has super-classes
Improper Resolution of Path Equivalence c

Path Equivalence: '/multiple/trailing/slash//'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-52

has super-classes
Improper Neutralization of Multiple Trailing Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: '\multiple\\internal\backslash'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-53

has super-classes
Improper Neutralization of Multiple Internal Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: 'fakedir/../realdir/filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-57

has super-classes
Improper Resolution of Path Equivalence c

Path Equivalence: 'file name' (Internal Whitespace)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-48

has super-classes
Improper Resolution of Path Equivalence c

Path Equivalence: 'file...name' (Multiple Internal Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-45

has super-classes
Improper Neutralization of Multiple Internal Special Elements c, Path Equivalence: 'file.name' (Internal Dot) c

Path Equivalence: 'file.name' (Internal Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-44

has super-classes
Improper Resolution of Path Equivalence c
has sub-classes
Path Equivalence: 'file...name' (Multiple Internal Dot) c

Path Equivalence: 'filedir*' (Wildcard)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-56

has super-classes
Improper Neutralization of Wildcards or Matching Symbols c, Improper Resolution of Path Equivalence c

Path Equivalence: 'filedir\' (Trailing Backslash)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-54

has super-classes
Improper Neutralization of Trailing Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: 'filename ' (Trailing Space)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-46

has super-classes
Improper Neutralization of Trailing Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: 'filename.' (Trailing Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-42

has super-classes
Improper Neutralization of Trailing Special Elements c, Improper Resolution of Path Equivalence c
has sub-classes
Path Equivalence: 'filename....' (Multiple Trailing Dot) c

Path Equivalence: 'filename....' (Multiple Trailing Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-43

has super-classes
Improper Neutralization of Multiple Trailing Special Elements c, Path Equivalence: 'filename.' (Trailing Dot) c

Path Equivalence: 'filename/' (Trailing Slash)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-49

has super-classes
Improper Neutralization of Trailing Special Elements c, Improper Resolution of Path Equivalence c

Path Equivalence: Windows 8.3 Filenamec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-58

has super-classes
Improper Resolution of Path Equivalence c

Path Interception by PATH Environment Variablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.007

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Path Interception by Search Order Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.008

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Path Interception by Unquoted Pathc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.009

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Path Traversal: '...' (Triple Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-32

has super-classes
Relative Path Traversal c

Path Traversal: '....' (Multiple Dot)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-33

has super-classes
Relative Path Traversal c

Path Traversal: '....//'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-34

has super-classes
Relative Path Traversal c

Path Traversal: '.../...//'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-35

has super-classes
Relative Path Traversal c

Path Traversal: '../filedir'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-24

has super-classes
Relative Path Traversal c

Path Traversal: '..\filedir'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-28

has super-classes
Relative Path Traversal c

Path Traversal: '/../filedir'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-25

has super-classes
Relative Path Traversal c

Path Traversal: '/absolute/pathname/here'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-37

has super-classes
Absolute Path Traversal c, Improper Neutralization of Leading Special Elements c

Path Traversal: '/dir/../filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-26

has super-classes
Relative Path Traversal c

Path Traversal: '\..\filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-29

has super-classes
Relative Path Traversal c

Path Traversal: '\\UNC\share\name\' (Windows UNC Share)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-40

has super-classes
Absolute Path Traversal c

Path Traversal: '\absolute\pathname\here'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-38

has super-classes
Absolute Path Traversal c

Path Traversal: '\dir\..\filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-30

has super-classes
Relative Path Traversal c

Path Traversal: 'C:dirname'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-39

has super-classes
Absolute Path Traversal c

Path Traversal: 'dir/../../filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-27

has super-classes
Relative Path Traversal c

Path Traversal: 'dir\..\..\filename'c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-31

has super-classes
Relative Path Traversal c

Pattern Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PatternMatching

has super-classes
Logical Rules c
has sub-classes
Numeric Pattern Matching c, String Pattern Matching c
is also defined as
named individual

Payloadc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Payload

has super-classes
Mekanoid Thing c

Pearson's Correlation Coefficientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PearsonsCorrelationCoefficient

has super-classes
Correlation c
is also defined as
named individual

Per Host Download-Upload Ratio Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PerHostDownload-UploadRatioAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Peripheral Device Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1120

has super-classes
Discovery Technique c

Peripheral Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PeripheralFirmware

has super-classes
Firmware c
has sub-classes
Graphics Card Firmware c, Hard Disk Firmware c, Human Input Device Firmware c, Network Card Firmware c, Peripheral Hub Firmware c
is also defined as
named individual

Peripheral Firmware Verificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PeripheralFirmwareVerification

has super-classes
Firmware Verification c
is also defined as
named individual

Peripheral Hub Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PeripheralHubFirmware

has super-classes
Peripheral Firmware c

Permission Groups Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1069

has super-classes
Discovery Technique c
has sub-classes
Cloud Groups c, Domain Groups c, Local Groups c

Permission Race Condition During Resource Copyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-689

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c

Permissive Cross-domain Policy with Untrusted Domainsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-942

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c, Permissive List of Allowed Inputs c

Permissive List of Allowed Inputsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-183

has super-classes
Incorrect Comparison c
has sub-classes
Permissive Cross-domain Policy with Untrusted Domains c

Permissive Regular Expressionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-625

has super-classes
Incorrect Regular Expression c
has sub-classes
Regular Expression without Anchors c

Persistencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Persistence

has super-classes
Offensive Tactic c
is also defined as
named individual

Persistence Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PersistenceTechnique

has super-classes
Offensive Technique c
has sub-classes
Accessibility Features c, Account Manipulation c, AppCert DLLs c, AppInit DLLs c, Application Shimming c, Authentication Package c, BITS Jobs c, Boot or Logon Autostart Execution c, Boot or Logon Initialization Scripts c, Bootkit c, Browser Extensions c, Change Default File Association c, Component Firmware c, Component Object Model Hijacking c, Compromise Client Software Binary c, Create Account c, Create or Modify System Process c, DLL Search Order Hijacking c, Dylib Hijacking c, Emond c, Event Triggered Execution c, External Remote Services c, File System Permissions Weakness c, Hidden Files and Directories c, Hijack Execution Flow c, Hooking c, Image File Execution Options Injection c, Implant Container Image c, Kernel Modules and Extensions c, LC_LOAD_DYLIB Addition c, LSASS Driver c, Launch Agent c, Launch Daemon c, Launchctl c, Local Job Scheduling c, Login Item c, Malicious Shell Modification c, Modify Existing Service c, Netsh Helper DLL c, New Service c, Office Application Startup c, Plist Modification c, Port Monitors c, PowerShell Profile c, Pre-OS Boot c, Rc.common c, Re-opened Applications c, Registry Run Keys / Startup Folder c, SIP and Trust Provider Hijacking c, Scheduled Task/Job Execution c, Screensaver c, Security Support Provider c, Server Software Component c, Service Registry Permissions Weakness c, Setuid and Setgid c, Shortcut Modification c, Startup Items c, System Firmware c, Systemd Service c, Time Providers c, Traffic Signaling c, Trap c, Valid Accounts c, Web Shell c, Windows Management Instrumentation Event Subscription c, Winlogon Helper DLL c
is also defined as
named individual

Persistent Storable Data Element without Associated Comparison Control Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1097

has super-classes
Insufficient Adherence to Expected Conventions c

Personc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Person

has super-classes
Agent c
has members
0000 0001 7399 6740 ni
is also defined as
named individual

Personal Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PersonalComputer

Is defined by
http://dbpedia.org/resource/Personal_computer
has super-classes
Client Computer c
has sub-classes
Desktop Computer c, IP Phone c, Laptop Computer c, Mobile Phone c, Tablet Computer c

Perturbation-based Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Perturbation-basedLearning

has super-classes
Intrinsically Semi-supervised Learning c
is also defined as
named individual

Phi Coefficientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhiCoefficient

has super-classes
Correlation c
is also defined as
named individual

Phishingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1566

has super-classes
Initial Access Technique c
has sub-classes
Spearphishing Attachment c, Spearphishing Link c, Spearphishing Via Service c

Phishing for Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1598

has super-classes
Reconnaissance Technique c
has sub-classes
Spearphishing Attachment c, Spearphishing Link c, Spearphishing Service c

PHP External Variable Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-473

has super-classes
Modification of Assumed-Immutable Data (MAID) c

Physical Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhysicalAddress

has super-classes
Memory Address c
is also defined as
named individual

Physical Artifactc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhysicalArtifact

has super-classes
Artifact c, Physical Object c
has sub-classes
Hardware Device c
is also defined as
named individual

Physical Link Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhysicalLinkMapping

has super-classes
Network Mapping c
has sub-classes
Active Physical Link Mapping c, Passive Physical Link Mapping c
has members
Active Physical Link Mapping ni, Passive Physical Link Mapping ni
is also defined as
named individual

Physical Locationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhysicalLocation

has super-classes
Digital Artifact c
is also defined as
named individual

Physical Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PhysicalObject

has super-classes
D3FEND Thing c
has sub-classes
Physical Artifact c

Pipec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Pipe

has super-classes
Interprocess Communication c
is also defined as
named individual

Pix2Pixc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Pix2Pix

has super-classes
Image-to-Image Translation GAN c
is also defined as
named individual

Placement of User into Incorrect Groupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-842

has super-classes
Incorrect User Management c

Plaintext Storage of a Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-256

has super-classes
Insufficiently Protected Credentials c

Planningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Planning

has super-classes
Analytical Purpose c
has sub-classes
Scheduling c

Platformc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Platform

has super-classes
Digital Artifact c
is also defined as
named individual

Platform Hardeningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PlatformHardening

has super-classes
Defensive Technique c
has sub-classes
Bootloader Authentication c, Disk Encryption c, Driver Load Integrity Checking c, File Encryption c, Local File Permissions c, RF Shielding c, Software Update c, System Configuration Permissions c, TPM Boot Integrity c
has members
Bootloader Authentication ni, Disk Encryption ni, Driver Load Integrity Checking ni, Executable Allowlisting ni, File Encryption ni, Local File Permissions ni, RF Shielding ni, Software Update ni, System Configuration Permissions ni, TPM Boot Integrity ni
is also defined as
named individual

Platform Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PlatformMonitoring

has super-classes
Defensive Technique c
has sub-classes
File Integrity Monitoring c, Firmware Behavior Analysis c, Firmware Embedded Monitoring Code c, Firmware Verification c, Operating System Monitoring c
has members
Firmware Behavior Analysis ni, Firmware Embedded Monitoring Code ni, Firmware Verification ni, Operating System Monitoring ni
is also defined as
named individual

Plist File Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1647

has super-classes
Defense Evasion Technique c

Plist Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1150

has super-classes
Defense Evasion Technique c, Persistence Technique c, Privilege Escalation Technique c

Plist Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.011

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Pluggable Authentication Modulesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556.003

has super-classes
Modify Authentication Process c
is also defined as
named individual

Point Estimationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PointEstimation

has super-classes
Estimation c
is also defined as
named individual

Point-biserial Correlation Coefficientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Point-biserialCorrelationCoefficient

has super-classes
Correlation c
is also defined as
named individual

Pointerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Pointer

has super-classes
Digital Artifact c
has sub-classes
Saved Instruction Pointer c
is also defined as
named individual

Pointer Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PointerAuthentication

has super-classes
Application Hardening c
is also defined as
named individual

Pointer Dereferencing Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PointerDereferencingFunction

has super-classes
Subroutine c
is also defined as
named individual

Policyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Policy

has super-classes
Document c
has sub-classes
Guidance c

Policy Gradientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PolicyGradient

has super-classes
Model-free Reinforcement Learning c
has sub-classes
Actor-Critic c
is also defined as
named individual

Policy Privileges are not Assigned Consistently Between Control and Data Agentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1268

has super-classes
Improper Access Control c

Policy Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PolicyReference

has super-classes
Technique Reference c
has sub-classes
Guideline Reference c

Policy Uses Obsolete Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1267

has super-classes
Improper Access Control c

Port Knockingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1205.001

has super-classes
Traffic Signaling c
is also defined as
named individual

Port Monitorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1013

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Port Monitorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.010

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Portable Executable Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.002

has super-classes
Process Injection c
is also defined as
named individual

Portfolio Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PortfolioAssessment

has super-classes
Assessment c

Power-On of Untrusted Execution Core Before Enabling Fabric Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1193

has super-classes
Incorrect Behavior Order c

PowerShellc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1086

has super-classes
Execution Technique c

PowerShell Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.001

has super-classes
Command and Scripting Interpreter Execution c

PowerShell Profilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1504

has super-classes
Persistence Technique c, Privilege Escalation Technique c

PowerShell Profilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.013

has super-classes
Event Triggered Execution c
is also defined as
named individual

PowerShell Profile Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PowerShellProfileScript

has super-classes
User Init Script c
is also defined as
named individual

Pre-OS Bootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542

has super-classes
Defense Evasion Technique c, Persistence Technique c
has sub-classes
Bootkit c, Component Firmware c, ROMMONkit c, System Firmware c, TFTP Boot c

Predicate Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PredicateLogic

has super-classes
Symbolic AI c
has sub-classes
First-order Logic c, Higher-order Logic c
is also defined as
named individual

Predictable Exact Value from Previous Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-342

has super-classes
Generation of Predictable Numbers or Identifiers c

Predictable from Observable Statec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-341

has super-classes
Generation of Predictable Numbers or Identifiers c

Predictable Seed in Pseudo-Random Number Generator (PRNG)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-337

has super-classes
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) c

Predictable Value Range from Previous Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-343

has super-classes
Generation of Predictable Numbers or Identifiers c

Premature Release of Resource During Expected Lifetimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-826

has super-classes
Operation on Resource in Wrong Phase of Lifetime c

Primary Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrimaryStorage

has super-classes
Hardware Device c, Storage c
has sub-classes
Processor Cache Memory c, Processor Register c, RAM c, ROM c
is also defined as
named individual

Principal Component Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrincipalComponentAnalysis

has super-classes
Multivariate Analysis c
is also defined as
named individual

Principal Components Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrincipalComponentsAnalysis

has super-classes
Dimension Reduction c
is also defined as
named individual

Print Processorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.012

has super-classes
Boot or Logon Autostart Execution c

Print Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrintServer

Is defined by
http://dbpedia.org/resource/Print_server
has super-classes
Server c

Private Data Structure Returned From A Public Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-495

has super-classes
Improper Control of a Resource Through its Lifetime c

Private IP Addressc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/PrivateIPAddress

Is defined by
https://en.wikipedia.org/wiki/IP_address#Private_addresses
Example
10.0.0.1
192.168.0.1
has super-classes
IP Address c
has members
10.1.12.1 ni, 10.1.12.101 ni

Private Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrivateKey

has super-classes
Asymmetric Key c
is also defined as
named individual

Private Keysc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1145

has super-classes
Credential Access Technique c

Private Keysc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552.004

has super-classes
Unsecured Credentials c
is also defined as
named individual

Privilege Chainingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-268

has super-classes
Improper Privilege Management c

Privilege Context Switching Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-270

has super-classes
Improper Privilege Management c

Privilege Defined With Unsafe Actionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-267

has super-classes
Improper Privilege Management c
has sub-classes
Unsafe ActiveX Control Marked Safe For Scripting c

Privilege Dropping / Lowering Errorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-271

has super-classes
Improper Privilege Management c
has sub-classes
Improper Check for Dropped Privileges c, Least Privilege Violation c

Privilege Escalationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrivilegeEscalation

has super-classes
Offensive Tactic c
is also defined as
named individual

Privilege Escalation Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrivilegeEscalationTechnique

has super-classes
Offensive Technique c
has sub-classes
Abuse Elevation Control Mechanism c, Access Token Manipulation c, Accessibility Features c, AppCert DLLs c, AppInit DLLs c, Application Shimming c, Boot or Logon Autostart Execution c, Boot or Logon Initialization Scripts c, Bypass User Account Control c, Create Account c, Create or Modify System Process c, DLL Search Order Hijacking c, Dylib Hijacking c, Elevated Execution with Prompt c, Emond c, Escape to Host c, Event Triggered Execution c, Exploitation for Privilege Escalation c, Extra Window Memory Injection c, File System Permissions Weakness c, Group Policy Modification c, Hijack Execution Flow c, Hooking c, Image File Execution Options Injection c, Launch Daemon c, New Service c, Parent PID Spoofing c, Plist Modification c, Port Monitors c, PowerShell Profile c, Process Injection c, SID-History Injection c, Scheduled Task/Job Execution c, Service Registry Permissions Weakness c, Setuid and Setgid c, Startup Items c, Sudo c, Sudo Caching c, Valid Accounts c, Web Shell c
is also defined as
named individual

Privileged User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PrivilegedUserAccount

Is defined by
https://www.ssh.com/iam/user/privileged-account
has super-classes
User Account c

Privileges Requiredc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-PrivilegesRequired

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. The Base Score is greatest if no privileges are required.
is equivalent to
{ High , Low , None }
has super-classes
CVSS Metric c
has members
High ni, Low ni, None ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Probabilistic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProbabilisticLogic

has super-classes
Symbolic AI c
is also defined as
named individual

Proc Filesystemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.007

has super-classes
OS Credential Dumping c
is also defined as
named individual

Proc Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.009

has super-classes
Process Injection c
is also defined as
named individual

Procedurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Procedure

has super-classes
D3FEND Thing c
has sub-classes
Use Case Procedure c
has members
Procedure 1 - T1134.001 Access Token Manipulation ni

Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Process

has super-classes
Digital Artifact c
has sub-classes
Child Process c, Operating System Process c, Parent Process c, User Process c
is in domain of
process-security-context dp
has members
BSD Process ni, Linux Process ni, Windows Process ni, iOS Process ni, macOS Process ni
is also defined as
named individual

Process Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessAnalysis

has super-classes
Defensive Technique c
has sub-classes
Database Query String Analysis c, File Access Pattern Analysis c, Indirect Branch Call Analysis c, Process Code Segment Verification c, Process Self-Modification Detection c, Process Spawn Analysis c, Script Execution Analysis c, Shadow Stack Comparisons c, System Call Analysis c
has members
Database Query String Analysis ni, File Access Pattern Analysis ni, Indirect Branch Call Analysis ni, Process Code Segment Verification ni, Process Self-Modification Detection ni, Process Spawn Analysis ni, Script Execution Analysis ni, Shadow Stack Comparisons ni, System Call Analysis ni
is also defined as
named individual

Process Argument Spoofingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.010

has super-classes
Hide Artifacts c

Process Code Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessCodeSegment

has super-classes
Process Segment c
has members
AMD64 Code Segment ni, ARM32 Code Segment ni, X86 Code Segment ni
is also defined as
named individual

Process Code Segment Verificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessCodeSegmentVerification

has super-classes
Process Analysis c
is also defined as
named individual

Process Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-114

has super-classes
External Control of File Name or Path c

Process Data Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessDataSegment

has super-classes
Process Segment c

Process Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1057

has super-classes
Discovery Technique c
is also defined as
named individual

Process Doppelgängingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.013

has super-classes
Process Injection c
is also defined as
named individual

Process Doppelgängingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1186

has super-classes
Defense Evasion Technique c

Process Environment Variablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessEnvironmentVariable

has super-classes
Application Configuration c
is also defined as
named individual

Process Evictionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessEviction

has super-classes
Defensive Technique c
has sub-classes
Process Suspension c, Process Termination c
has members
Process Suspension ni, Process Termination ni
is also defined as
named individual

Process Hollowingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.012

has super-classes
Process Injection c
is also defined as
named individual

Process Hollowingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1093

has super-classes
Defense Evasion Technique c

Process Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessImage

has super-classes
Digital Artifact c
is also defined as
named individual

Process Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055

has super-classes
Defense Evasion Technique c, Privilege Escalation Technique c
has sub-classes
Asynchronous Procedure Call c, Dynamic-link Library Injection c, Extra Window Memory Injection c, ListPlanting c, Portable Executable Injection c, Proc Memory c, Process Doppelgänging c, Process Hollowing c, Ptrace System Calls c, Thread Execution Hijacking c, Thread Local Storage c, VDSO Hijacking c

Process Lineage Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessLineageAnalysis

has super-classes
Process Spawn Analysis c
is also defined as
named individual

Process Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessSegment

has super-classes
Binary Segment c
has sub-classes
Heap Segment c, Process Code Segment c, Process Data Segment c, Stack Segment c
is also defined as
named individual

Process Segment Execution Preventionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessSegmentExecutionPrevention

has super-classes
Application Hardening c
is also defined as
named individual

Process Self-Modification Detectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessSelf-ModificationDetection

has super-classes
Process Analysis c
is also defined as
named individual

Process Spawn Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessSpawnAnalysis

has super-classes
Process Analysis c
has sub-classes
Process Lineage Analysis c
has members
Process Lineage Analysis ni
is also defined as
named individual

Process Start Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessStartFunction

has super-classes
Subroutine c
is also defined as
named individual

Process Suspensionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessSuspension

has super-classes
Process Eviction c
is also defined as
named individual

Process Terminationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessTermination

has super-classes
Process Eviction c
is also defined as
named individual

Process Treec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessTree

has super-classes
Digital Artifact c
is also defined as
named individual

Processorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Processor

has super-classes
Hardware Device c
has sub-classes
Central Processing Unit c, Graphics Processing Unit c

Processor Cache Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CacheMemory

has super-classes
Primary Storage c
is also defined as
named individual

Processor Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessorComponent

has super-classes
Hardware Device c
has sub-classes
Memory Management Unit c, Memory Protection Unit c

Processor Optimization Removal or Modification of Security-critical Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1037

has super-classes
Insecure Automated Optimizations c

Processor Registerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProcessorRegister

has super-classes
Primary Storage c
is also defined as
named individual

Productc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Product

has super-classes
Capability Implementation c
has sub-classes
Appliance c, Software Product c

Product Developerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProductDeveloper

has super-classes
Provider c
has sub-classes
Open-source Developer c
has members
Docker, Inc. ni, Google ni, Microsoft ni, apache ni, intel ni, kubernetes ni, python ni

Product Released in Non-Release Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1269

has super-classes
Protection Mechanism Failure c

Product UI does not Warn User of Unsafe Actionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-356

has super-classes
Information Loss or Omission c

Progressively Growing GANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProgressivelyGrowingGAN

has super-classes
Image Synthesis GAN c
is also defined as
named individual

Projected Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProjectedClustering

has super-classes
High-dimension Clustering c
is also defined as
named individual

Projection-based Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Projection-basedClustering

has super-classes
High-dimension Clustering c
has sub-classes
t-SNE Clustering c
is also defined as
named individual

Prologc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Prolog

has super-classes
Logic Programming c
is also defined as
named individual

Property List Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PropertyListFile

has super-classes
Configuration File c
is also defined as
named individual

Propositionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Proposition

Is defined by
http://semanticscience.org/resource/SIO_000256
has super-classes
D3FEND Catalog Thing c
has sub-classes
Statement c, verdict c

Propositional Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PropositionalLogic

has super-classes
Symbolic AI c
is also defined as
named individual

Proprietary Licensec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProprietaryLicense

has super-classes
License c

Protection Mechanism Failurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-693

has super-classes
Weakness c
has sub-classes
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations c, Client-Side Enforcement of Server-Side Security c, Collapse of Data into Unsafe Value c, Improper Isolation or Compartmentalization c, Improper Protection against Electromagnetic Fault Injection (EM-FI) c, Improper Protection of Alternate Path c, Improper Protections Against Hardware Overheating c, Improperly Implemented Security Check for Standard c, Inadequate Encryption Strength c, Incomplete List of Disallowed Inputs c, Incorrect Selection of Fuse Values c, Insufficient Logging c, Insufficient Psychological Acceptability c, Insufficient UI Warning of Dangerous Operations c, Insufficient Verification of Data Authenticity c, Missing Encryption of Sensitive Data c, Missing Immutable Root of Trust in Hardware c, Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques c, Missing Support for Security Features in On-chip Fabrics or Buses c, Product Released in Non-Release Configuration c, Public Key Re-Use for Signing both Debug and Production Code c, Reliance on Security Through Obscurity c, Reliance on Untrusted Inputs in a Security Decision c, Reliance on a Single Factor in a Security Decision c, Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') c, Semiconductor Defects in Hardware Logic with Security-Sensitive Implications c, Use of Insufficiently Random Values c, Use of a Broken or Risky Cryptographic Algorithm c

Protocol Impersonationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1001.003

has super-classes
Data Obfuscation c

Protocol Metadata Anomaly Detectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProtocolMetadataAnomalyDetection

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Protocol Tunnelingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1572

has super-classes
Command and Control Technique c
is also defined as
named individual

Providerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Provider

has super-classes
Organization c
has sub-classes
Product Developer c, Service Provider c, Vendor c

Proxyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1090

has super-classes
Command and Control Technique c
has sub-classes
Domain Fronting c, External Proxy c, Internal Proxy c, Multi-hop Proxy c

Proxy Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ProxyServer

Is defined by
http://dbpedia.org/resource/Proxy_server
has super-classes
Network Node c, Server c
has sub-classes
Forward Proxy Server c, Reverse Proxy Server c

Ptrace System Callsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.008

has super-classes
Process Injection c
is also defined as
named individual

Public cloneable() Method Without Final ('Object Hijack')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-491

has super-classes
Exposure of Resource to Wrong Sphere c

Public Data Assigned to Private Array-Typed Fieldc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-496

has super-classes
Improper Control of a Resource Through its Lifetime c

Public IP Addressc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/PublicIPAddress

A public IP address is a globally routable unicast IP address, meaning that the address is not an address reserved for use in private networks, such as those reserved by RFC 1918, or the various IPv6 address formats of local scope or site-local scope, for example for link-local addressing. Public IP addresses may be used for communication between hosts on the global Internet. In a home situation, a public IP address is the IP address assigned to the home's network by the ISP. In this case, it is also locally visible by logging into the router configuration.
Is defined by
https://en.wikipedia.org/wiki/IP_address#Public_address
Example
4.2.2.1
8.8.8.8
has super-classes
IP Address c
has members
109.107.181.33 ni, 162.248.51.100 ni, 46.4.205.200 ni

Public Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PublicKey

has super-classes
Asymmetric Key c
is also defined as
named individual

Public Key Re-Use for Signing both Debug and Production Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1291

has super-classes
Protection Mechanism Failure c

Public Static Field Not Marked Finalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-500

has super-classes
Critical Public Variable Without Final Modifier c

Public Static Final Field References Mutable Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-607

has super-classes
Modification of Assumed-Immutable Data (MAID) c

PubPrn Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1216.001

has super-classes
Signed Script Proxy Execution c

Purchase Technical Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1597.002

has super-classes
Search Closed Sources c

Python Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.006

has super-classes
Command and Scripting Interpreter Execution c

Python Packagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PythonPackage

has super-classes
Software Package c

Python Script Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#PythonScriptFile

has super-classes
Executable Script c

Q-Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Q-Learning

has super-classes
Model-free Reinforcement Learning c
has sub-classes
Deep Q-learning c
is also defined as
named individual

Query By Committeec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#QueryByCommittee

has super-classes
Active Learning c
is also defined as
named individual

Query Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1012

has super-classes
Discovery Technique c
is also defined as
named individual

Race Condition During Access to Alternate Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-421

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c, Unprotected Alternate Channel c

Race Condition Enabling Link Followingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-363

has super-classes
Time-of-check Time-of-use (TOCTOU) Race Condition c

Race Condition for Write-Once Attributesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1223

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c

Race Condition within a Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-366

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c

Radio Modemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RadioModem

Is defined by
http://dbpedia.org/resource/Modem#Radio
has super-classes
Modem c

RAMc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RAM

Is defined by
https://dbpedia.org/page/Random-access_memory
has super-classes
Primary Storage c

Random Forestc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RandomForest

has super-classes
Bootstrap Aggregating c
is also defined as
named individual

Random Splitsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RandomSplits

has super-classes
Resampling Ensemble c
is also defined as
named individual

Rangec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Range

has super-classes
Variability c
is disjoint with
Coefficient of Variation c, Interquartile Range c, Mean Absolute Deviation c, Median Absolute Deviation c, Standard Deviation c, Variance c
is also defined as
named individual

Range Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RangeMatching

has super-classes
Numeric Pattern Matching c
is also defined as
named individual

Rank Correlationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RankCorrelationCoefficient

has super-classes
Correlation c
has sub-classes
Goodman and Kruskal's Gamma c, Kendall's Rank Correlation Coefficient c, Somers' D c, Spearman's Rank Correlation Coefficient c
is also defined as
named individual

Raw Memory Access Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RawMemoryAccessFunction

has super-classes
Subroutine c
is also defined as
named individual

Rc.commonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037.004

has super-classes
Boot or Logon Initialization Scripts c
is also defined as
named individual

Rc.commonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1163

has super-classes
Persistence Technique c

RDP Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1563.002

has super-classes
Remote Service Session Hijacking c
is also defined as
named individual

RDP Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RDPSession

has super-classes
Remote Session c
is also defined as
named individual

Re-opened Applicationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1164

has super-classes
Persistence Technique c

Re-opened Applicationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.007

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Reachable Assertionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-617

has super-classes
Always-Incorrect Control Flow Implementation c

Read Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReadFile

has super-classes
System Call c
is also defined as
named individual

Reconnaissancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Reconnaissance

has super-classes
Offensive Tactic c
is also defined as
named individual

Reconnaissance Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReconnaissanceTechnique

has super-classes
Offensive Technique c
has sub-classes
Active Scanning c, Gather Victim Host Information c, Gather Victim Identity Information c, Gather Victim Network Information c, Gather Victim Org Information c, Phishing for Information c, Search Closed Sources c, Search Open Technical Databases c, Search Open Websites/Domains c, Search Victim-Owned Websites c
is also defined as
named individual

Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Record

has super-classes
Digital Artifact c
has sub-classes
Actionable Item c, Analysis Report c, Boot Record c, Configuration Database Record c, DNS Record c, Log c, System Utilization Record c
is also defined as
named individual

Recurrent Neural Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RecurrentNeuralNetwork

has super-classes
Deep Neural Network Classification c
has sub-classes
Gated Recurrent Unit c, Long Short-term Memory c
is also defined as
named individual

Reduce Key Spacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1600.001

has super-classes
Weaken Encryption c

Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Reference

has super-classes
D3FEND Thing c
is in domain of
d3fend-kb-reference-annotation, kb-abstract, kb-author, kb-mitre-analysis, kb-reference-of op, kb-reference-title dp

Reference Typec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReferenceType

has super-classes
D3FEND Thing c
has members
Book ni, Internet Article ni, Marketing Material ni, Patent ni, Source Code ni, User Manual ni

Reflection Amplificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1498.002

has super-classes
Network Denial of Service c
is also defined as
named individual

Reflection Attack in an Authentication Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-301

has super-classes
Weak Authentication c

Reflective Code Loadingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1620

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Regex Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RegexMatching

has super-classes
Partial Matching c
is also defined as
named individual

Registry Run Keys / Startup Folderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1060

has super-classes
Persistence Technique c

Registry Run Keys / Startup Folderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.001

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Regression Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RegressionAnalysis

has super-classes
Statistical Method c
has sub-classes
Bayesian Linear Regression c, Linear Regression c, Logistic Regression c, Multiple Regression c, Nonlinear Regression c
is also defined as
named individual

Regression Analysis Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RegressionAnalysisLearning

has super-classes
Supervised Learning c
has sub-classes
Bayesian Linear Regression Learning c, Decision Tree Regression c, Linear Regression Learning c, Logistic Regression Learning c, Multiple Regression Learning c, Nonlinear Regression Learning c
is also defined as
named individual

Regsvcs/Regasmc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1121

has super-classes
Defense Evasion Technique c, Execution Technique c

Regsvcs/Regasm Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.009

has super-classes
Signed Binary Proxy Execution c

Regsvr32c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1117

has super-classes
Defense Evasion Technique c, Execution Technique c

Regsvr32 Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.010

has super-classes
Signed Binary Proxy Execution c

Regular Expression without Anchorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-777

has super-classes
Permissive Regular Expression c

Reinforcement Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReinforcementLearning

has super-classes
Machine Learning c
has sub-classes
Model-based Reinforcement Learning c, Model-free Reinforcement Learning c
is also defined as
named individual

Reissue Credentialc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReissueCredential

has super-classes
Restore Object c
is also defined as
named individual

Relational-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Relational-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Relative Path Traversalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-23

has super-classes
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') c
has sub-classes
Path Traversal: '...' (Triple Dot) c, Path Traversal: '....' (Multiple Dot) c, Path Traversal: '....//' c, Path Traversal: '.../...//' c, Path Traversal: '../filedir' c, Path Traversal: '..\filedir' c, Path Traversal: '/../filedir' c, Path Traversal: '/dir/../filename' c, Path Traversal: '\..\filename' c, Path Traversal: '\dir\..\filename' c, Path Traversal: 'dir/../../filename' c, Path Traversal: 'dir\..\..\filename' c

Relay Pattern Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RelayPatternAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Release of Invalid Pointer or Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-763

has super-classes
Improper Resource Shutdown or Release c
has sub-classes
Free of Pointer not at Start of Buffer c, Mismatched Memory Management Routines c

Reliance on a Single Factor in a Security Decisionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-654

has super-classes
Protection Mechanism Failure c, Violation of Secure Design Principles c
has sub-classes
Use of Password System for Primary Authentication c, Use of Single-factor Authentication c

Reliance on Component That is Not Updateablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1329

has super-classes
Improper Control of a Resource Through its Lifetime c, Reliance on Insufficiently Trustworthy Component c
has sub-classes
Firmware Not Updateable c, Missing Ability to Patch ROM Code c

Reliance on Cookies without Validation and Integrity Checkingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-565

has super-classes
Client-Side Enforcement of Server-Side Security c, External Control of Critical State Data c
has sub-classes
Reliance on Cookies without Validation and Integrity Checking in a Security Decision c

Reliance on Cookies without Validation and Integrity Checking in a Security Decisionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-784

has super-classes
Reliance on Cookies without Validation and Integrity Checking c, Reliance on Untrusted Inputs in a Security Decision c

Reliance on Data/Memory Layoutc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-188

has super-classes
Improper Interaction Between Multiple Correctly-Behaving Entities c, Insufficient Encapsulation of Machine-Dependent Functionality c
has sub-classes
Use of Incorrect Byte Ordering c

Reliance on File Name or Extension of Externally-Supplied Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-646

has super-classes
Insufficient Verification of Data Authenticity c

Reliance on Insufficiently Trustworthy Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1357

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Reliance on Component That is Not Updateable c, Use of Unmaintained Third Party Components c

Reliance on IP Address for Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-291

has super-classes
Authentication Bypass by Spoofing c, Improper Restriction of Communication Channel to Intended Endpoints c, Modification of Assumed-Immutable Data (MAID) c

Reliance on Machine-Dependent Data Representationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1102

has super-classes
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c

Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checkingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-649

has super-classes
Insufficient Verification of Data Authenticity c

Reliance on Package-level Scopec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-487

has super-classes
Improper Control of a Resource Through its Lifetime c

Reliance on Reverse DNS Resolution for a Security-Critical Actionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-350

has super-classes
Authentication Bypass by Spoofing c, Reliance on Untrusted Inputs in a Security Decision c

Reliance on Runtime Component in Generated Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1101

has super-classes
Improper Adherence to Coding Standards c

Reliance on Security Through Obscurityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-656

has super-classes
Protection Mechanism Failure c, Violation of Secure Design Principles c

Reliance on Undefined, Unspecified, or Implementation-Defined Behaviorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-758

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Assignment of a Fixed Address to a Pointer c, Attempt to Access Child of a Non-structure Pointer c, Insecure Automated Optimizations c, Insufficient Encapsulation of Machine-Dependent Functionality c, Reliance on Machine-Dependent Data Representation c, Return of Stack Variable Address c, Use of Function with Inconsistent Implementations c, Use of Platform-Dependent Third Party Components c

Reliance on Untrusted Inputs in a Security Decisionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-807

has super-classes
Protection Mechanism Failure c
has sub-classes
Authentication Bypass by Assumed-Immutable Data c, Reliance on Cookies without Validation and Integrity Checking in a Security Decision c, Reliance on Reverse DNS Resolution for a Security-Critical Action c

Remanent Data Readable after Memory Erasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1330

has super-classes
Insufficient or Incomplete Data Removal within Hardware Component c

Remediation Levelc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-RemediationLevel

The Remediation Level of a vulnerability is an important factor for prioritization. The typical vulnerability is unpatched when initially published. Workarounds or hotfixes may offer interim remediation until an official patch or upgrade is issued. Each of these respective stages adjusts the Temporal Score downwards, reflecting the decreasing urgency as remediation becomes final. The list of possible values is presented in Table 10. The less official and permanent a fix, the higher the vulnerability score.
is equivalent to
{ Not Defined (X) , Official Fix (O) , Temporary Fix (T) , Unavailable (U) , Workaround (W) }
has super-classes
CVSS Metric c
is in range of
remediation level op
has members
Not Defined (X) ni, Official Fix (O) ni, Temporary Fix (T) ni, Unavailable (U) ni, Workaround (W) ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Report Confidence c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Remote Access Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1219

has super-classes
Command and Control Technique c
is also defined as
named individual

Remote Authentication Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteAuthenticationService

has super-classes
Authentication Service c, Network Service c

Remote Authorization Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteAuthorizationService

has super-classes
Authorization Service c

Remote Commandc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteCommand

has super-classes
Command c, Network Session c
has sub-classes
Remote Database Query c, Remote Procedure Call c

Remote Data Stagingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1074.002

has super-classes
Data Staged c
is also defined as
named individual

Remote Database Queryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteDatabaseQuery

has super-classes
Database Query c, Remote Command c

Remote Desktop Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.001

has super-classes
Remote Services c
is also defined as
named individual

Remote Desktop Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1076

has super-classes
Lateral Movement Technique c

Remote Email Collectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1114.002

has super-classes
Email Collection c
is also defined as
named individual

Remote Procedure Callc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteProcedureCall

Is defined by
http://dbpedia.org/resource/Remote_procedure_call
has super-classes
Remote Command c

Remote Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteResource

has super-classes
Resource c
has sub-classes
Network Resource c

Remote Service Session Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1563

has super-classes
Lateral Movement Technique c
has sub-classes
RDP Hijacking c, SSH Hijacking c
is also defined as
named individual

Remote Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021

has super-classes
Lateral Movement Technique c
has sub-classes
Distributed Component Object Model c, Remote Desktop Protocol c, SMB/Windows Admin Shares c, SSH c, VNC c, Windows Remote Management c
is also defined as
named individual

Remote Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteSession

has super-classes
Login Session c
has sub-classes
RDP Session c, SSH Session c
is also defined as
named individual

Remote System Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1018

has super-classes
Discovery Technique c
is also defined as
named individual

Remote Terminal Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteTerminalSession

has super-classes
Network Session c

Remote Terminal Session Detectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemoteTerminalSessionDetection

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Removable Media Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RemovableMediaDevice

has super-classes
Hardware Device c
is also defined as
named individual

Rename System Utilitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.003

has super-classes
Masquerading c
is also defined as
named individual

Replicating Malicious Code (Virus or Worm)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-509

has super-classes
Trojan Horse c

Replication Through Removable Mediac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1091

has super-classes
Initial Access Technique c, Lateral Movement Technique c
is also defined as
named individual

Report Confidencec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-ReportConfidence

This metric measures the degree of confidence in the existence of the vulnerability and the credibility of the known technical details. Sometimes only the existence of vulnerabilities is publicized, but without specific details. For example, an impact may be recognized as undesirable, but the root cause may not be known. The vulnerability may later be corroborated by research which suggests where the vulnerability may lie, though the research may not be certain. Finally, a vulnerability may be confirmed through acknowledgment by the author or vendor of the affected technology. The urgency of a vulnerability is higher when a vulnerability is known to exist with certainty. This metric also suggests the level of technical knowledge available to would-be attackers. The more a vulnerability is validated by the vendor or other reputable sources, the higher the score.
is equivalent to
{ Confirmed , Not Defined (X) , Reasonable (R) , Unknown (U) }
has super-classes
CVSS Metric c
is in range of
report confidence op
has members
Confirmed ni, Not Defined (X) ni, Reasonable (R) ni, Unknown (U) ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Scope c, Security Requirement c, Severity Type c, User Interaction c

Resampling Ensemblec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResamplingEnsemble

has super-classes
Ensemble Learning c
has sub-classes
Bootstrap Aggregating c, K-Fold Cross-Validation c, Random Splits c
is also defined as
named individual

Residual Neural Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResidualNeuralNetwork

has super-classes
Convolutional Neural Network c
is also defined as
named individual

Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Resource

has super-classes
Digital Artifact c
has sub-classes
Configuration Resource c, File c, Local Resource c, Remote Resource c
is in domain of
addressed-by op
is in range of
addresses op
is also defined as
named individual

Resource Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResourceAccess

has super-classes
Digital Event c, User Action c
has sub-classes
Local Resource Access c, Network Resource Access c
is also defined as
named individual

Resource Access Pattern Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResourceAccessPatternAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

Resource Developmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResourceDevelopment

has super-classes
Offensive Tactic c
is also defined as
named individual

Resource Development Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResourceDevelopmentTechnique

has super-classes
Offensive Technique c
has sub-classes
Acquire Infrastructure c, Compromise Accounts c, Compromise Infrastructure c, Develop Capabilities c, Establish Accounts c, Obtain Capabilities c, Stage Capabilities c
is also defined as
named individual

Resource Forkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ResourceFork

has super-classes
File Section c
is also defined as
named individual

Resource Forkingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.009

has super-classes
Hide Artifacts c
is also defined as
named individual

Resource Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1496

has super-classes
Impact Technique c

Restorec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Restore

has super-classes
Defensive Tactic c
is also defined as
named individual

Restore Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreAccess

has super-classes
Defensive Technique c
has sub-classes
Restore Network Access c, Restore User Account Access c
has members
Restore Network Access ni, Restore User Account Access ni
is also defined as
named individual

Restore Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreConfiguration

has super-classes
Restore Object c
is also defined as
named individual

Restore Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreDatabase

has super-classes
Restore Object c
is also defined as
named individual

Restore Disk Imagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreDiskImage

has super-classes
Restore Object c
is also defined as
named individual

Restore Emailc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreEmail

has super-classes
Restore File c
is also defined as
named individual

Restore Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreFile

has super-classes
Restore Object c
has sub-classes
Restore Email c
has members
Restore Email ni
is also defined as
named individual

Restore Network Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreNetworkAccess

has super-classes
Restore Access c
is also defined as
named individual

Restore Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreObject

has super-classes
Defensive Technique c
has sub-classes
Reissue Credential c, Restore Configuration c, Restore Database c, Restore Disk Image c, Restore File c, Restore Software c
has members
Reissue Credential ni, Restore Configuration ni, Restore Database ni, Restore Disk Image ni, Restore File ni, Restore Software ni
is also defined as
named individual

Restore Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreSoftware

has super-classes
Restore Object c
is also defined as
named individual

Restore User Account Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RestoreUserAccountAccess

has super-classes
Restore Access c
has sub-classes
Unlock Account c
has members
Unlock Account ni
is also defined as
named individual

Return Inside Finally Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-584

has super-classes
Incorrect Control Flow Scoping c

Return of Pointer Value Outside of Expected Rangec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-466

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Return of Stack Variable Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-562

has super-classes
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c

Return of Wrong Status Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-393

has super-classes
Improper Check or Handling of Exceptional Conditions c, Incorrect Provision of Specified Functionality c

Returning a Mutable Object to an Untrusted Callerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-375

has super-classes
Exposure of Resource to Wrong Sphere c

Reusing a Nonce, Key Pair in Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-323

has super-classes
Use of Invariant Value in Dynamically Changing Context c

Reverse Proxy Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReverseProxyServer

Is defined by
http://dbpedia.org/resource/Reverse_proxy
has super-classes
Proxy Server c

Reverse Resolution Domain Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReverseResolutionDomainDenylisting

has super-classes
DNS Denylisting c
is also defined as
named individual

Reverse Resolution IP Denylistingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ReverseResolutionIPDenylisting

has super-classes
DNS Denylisting c
is also defined as
named individual

Reversible Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1556.005

has super-classes
Modify Authentication Process c

Revert Cloud Instancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1536

has super-classes
Defense Evasion Technique c

Revert Cloud Instancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1578.004

has super-classes
Modify Cloud Compute Infrastructure c

RF Nodec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RFNode

has super-classes
Network Node c
has sub-classes
RF Receiver c, RF Transceiver c, RF Transmitter c

RF Receiverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RFReceiver

has super-classes
RF Node c

RF Shieldingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RFShielding

has super-classes
Platform Hardening c
is also defined as
named individual

RF Transceiverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RFTransceiver

has super-classes
RF Node c
has sub-classes
Wireless Access Point c

RF Transmitterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RFTransmitter

has super-classes
RF Node c

Right-to-Left Overridec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.002

has super-classes
Masquerading c
is also defined as
named individual

Rogue Domain Controllerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1207

has super-classes
Defense Evasion Technique c
is also defined as
named individual

ROMc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ROM

Is defined by
https://dbpedia.org/page/Read-only_memory
has super-classes
Primary Storage c

ROMMONkitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542.004

has super-classes
Pre-OS Boot c
is also defined as
named individual

Rootkitc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1014

has super-classes
Defense Evasion Technique c
is also defined as
named individual

Routerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Router

Is defined by
http://dbpedia.org/resource/Router_(computing)
has super-classes
Network Node c
has sub-classes
Wireless Router c

RPC Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RPCNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Intranet RPC Network Traffic c, Outbound Internet RPC Traffic c
is also defined as
named individual

RPC Traffic Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#RPCTrafficAnalysis

has super-classes
Network Traffic Analysis c
is also defined as
named individual

Run Virtual Instancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.006

has super-classes
Hide Artifacts c
is also defined as
named individual

Rundll32c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1085

has super-classes
Defense Evasion Technique c, Execution Technique c

Rundll32 Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.011

has super-classes
Signed Binary Proxy Execution c
is also defined as
named individual

Runtime Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1494

has super-classes
Impact Technique c

Runtime Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1565.003

has super-classes
Data Manipulation c
is also defined as
named individual

Runtime Resource Management Control Element in a Component Built to Run on Application Serversc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1065

has super-classes
Improper Adherence to Coding Standards c

Safe Mode Bootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1562.009

has super-classes
Impair Defenses c
is also defined as
named individual

Same Seed in Pseudo-Random Number Generator (PRNG)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-336

has super-classes
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) c

SAML Tokensc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1606.002

has super-classes
Forge Web Credentials c

SARSAc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SARSA

has super-classes
Model-free Reinforcement Learning c
is also defined as
named individual

Saved Instruction Pointerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SavedInstructionPointer

has super-classes
Pointer c, Stack Component c

Scan Databasesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596.005

has super-classes
Search Open Technical Databases c

Scanning IP Blocksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1595.001

has super-classes
Active Scanning c

Scheduled Jobc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ScheduledJob

has super-classes
Operating System Process c
is also defined as
named individual

Scheduled Job Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ScheduledJobAnalysis

has super-classes
Operating System Monitoring c
is also defined as
named individual

Scheduled Task/Job Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053

has super-classes
Execution Technique c, Persistence Technique c, Privilege Escalation Technique c
has sub-classes
At (Linux) Execution c, At (Windows) Execution c, Container Orchestration Job c, Cron Execution c, Launchd c, Schtasks Execution c, Systemd Timers c
is also defined as
named individual

Scheduled Transferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1029

has super-classes
Exfiltration Technique c
is also defined as
named individual

Schedulingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Scheduling

has super-classes
Planning c

Schtasks Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.005

has super-classes
Scheduled Task/Job Execution c
is also defined as
named individual

Scopec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-Scope

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs. The security scope of a component encompasses other components that provide functionality solely to that component, even if these other components have their own security authority. For example, a database used solely by one application is considered part of that application’s security scope even if the database has its own security authority, e.g., a mechanism controlling access to database records based on database users and associated database privileges. The Base Score is greatest when a scope change occurs.
is equivalent to
{ Changed , Unchanged }
has super-classes
CVSS Metric c
has members
Changed ni, Unchanged ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Security Requirement c, Severity Type c, User Interaction c

Screen Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1113

has super-classes
Collection Technique c
is also defined as
named individual

Screensaverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1180

has super-classes
Persistence Technique c

Screensaverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.002

has super-classes
Event Triggered Execution c
is also defined as
named individual

Script Application Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ScriptApplicationProcess

has super-classes
Application Process c
is also defined as
named individual

Script Execution Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ScriptExecutionAnalysis

has super-classes
Process Analysis c
is also defined as
named individual

Search Closed Sourcesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1597

has super-classes
Reconnaissance Technique c
has sub-classes
Purchase Technical Data c, Threat Intel Vendors c

Search Enginesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1593.002

has super-classes
Search Open Websites/Domains c

Search Open Technical Databasesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596

has super-classes
Reconnaissance Technique c
has sub-classes
CDNs c, DNS/Passive DNS c, Digital Certificates c, Scan Databases c, WHOIS c

Search Open Websites/Domainsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1593

has super-classes
Reconnaissance Technique c
has sub-classes
Search Engines c, Social Media c

Search Victim-Owned Websitesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1594

has super-classes
Reconnaissance Technique c

Second-stage Boot Loaderc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Second-stageBootLoader

has super-classes
Boot Loader c

Secondary Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SecondaryStorage

Is defined by
https://whatis.techtarget.com/definition/memory
has super-classes
Hardware Device c, Storage c
has sub-classes
Cloud Storage c, Flash Memory c, Tertiary Storage c

Security Account Managerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1003.002

has super-classes
OS Credential Dumping c
is also defined as
named individual

Security Policyc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/SecurityPolicy

has super-classes
Application Rule c, control c

Security Requirementc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-SecurityRequirement

These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability. That is, if an IT asset supports a business function for which Availability is most important, the analyst can assign a greater value to Availability relative to Confidentiality and Integrity. Each Security Requirement has three possible values: Low, Medium, or High. The full effect on the environmental score is determined by the corresponding Modified Base Impact metrics. That is, these metrics modify the environmental score by reweighting the Modified Confidentiality, Integrity, and Availability impact metrics. For example, the Modified Confidentiality impact (MC) metric has increased weight if the Confidentiality Requirement (CR) is High. Likewise, the Modified Confidentiality impact metric has decreased weight if the Confidentiality Requirement is Low. The Modified Confidentiality impact metric weighting is neutral if the Confidentiality Requirement is Medium. This same process is applied to the Integrity and Availability requirements. Note that the Confidentiality Requirement will not affect the Environmental score if the (Modified Base) confidentiality impact is set to None. Also, increasing the Confidentiality Requirement from Medium to High will not change the Environmental score when the (Modified Base) impact metrics are set to High. This is because the Modified Impact Sub-Score (part of the Modified Base Score that calculates impact) is already at a maximum value of 10.
is equivalent to
{ High , Low , Medium , Not Defined (X) }
has super-classes
CVSS Metric c
has members
High ni, Low ni, Medium ni, Not Defined (X) ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Severity Type c, User Interaction c

Security Software Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1063

has super-classes
Discovery Technique c

Security Software Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1518.001

has super-classes
Software Discovery c
is also defined as
named individual

Security Support Providerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1101

has super-classes
Persistence Technique c

Security Support Providerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.005

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Security Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SecurityToken

has super-classes
Hardware Device c
is also defined as
named individual

Security Version Number Mutable to Older Versionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1328

has super-classes
Improper Authorization c

Security-Sensitive Hardware Controls with Missing Lock Bit Protectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1233

has super-classes
Improper Access Control c, Improper Locking c

Securityd Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1167

has super-classes
Credential Access Technique c

Securityd Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555.002

has super-classes
Credentials from Password Stores c
is also defined as
named individual

Segment Address Offset Randomizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SegmentAddressOffsetRandomization

has super-classes
Application Hardening c
is also defined as
named individual

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-757

has super-classes
Protection Mechanism Failure c

Self-generated Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-210

has super-classes
Generation of Error Message Containing Sensitive Information c

Self-organizing Mapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Self-organizingMap

has super-classes
ANN-based Clustering c
is also defined as
named individual

Semi-supervised Boostingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedBoosting

has super-classes
Semi-supervised Wrapper Method c
is also defined as
named individual

Semi-supervised Cluster-then-labelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedCluster-then-label

has super-classes
Unsupervised Preprocessing c
is also defined as
named individual

Semi-supervised Co-trainingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedCo-training

has super-classes
Semi-supervised Wrapper Method c
is also defined as
named individual

Semi-supervised Feature Extractionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedFeatureExtraction

has super-classes
Unsupervised Preprocessing c
is also defined as
named individual

Semi-supervised Generative Model Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedGenerativeModelLearning

has super-classes
Intrinsically Semi-supervised Learning c
is also defined as
named individual

Semi-supervised Inductive Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedInductiveLearning

has super-classes
Semi-Supervised Learning c
is also defined as
named individual

Semi-Supervised Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-SupervisedLearning

has super-classes
Machine Learning c
has sub-classes
Intrinsically Semi-supervised Learning c, Semi-supervised Inductive Learning c, Semi-supervised Transductive Learning c, Semi-supervised Wrapper Method c, Unsupervised Preprocessing c
is also defined as
named individual

Semi-supervised Manifold Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedManifoldLearning

has super-classes
Intrinsically Semi-supervised Learning c
is also defined as
named individual

Semi-supervised Pre-trainingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedPre-training

has super-classes
Unsupervised Preprocessing c
is also defined as
named individual

Semi-supervised Self-trainingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedSelf-training

has super-classes
Semi-supervised Wrapper Method c
is also defined as
named individual

Semi-supervised Transductive Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedTransductiveLearning

has super-classes
Semi-Supervised Learning c
has sub-classes
Graph-based Semi-supervised Learning c
is also defined as
named individual

Semi-supervised Wrapper Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Semi-supervisedWrapperMethod

has super-classes
Semi-Supervised Learning c
has sub-classes
Semi-supervised Boosting c, Semi-supervised Co-training c, Semi-supervised Self-training c
is also defined as
named individual

Semiconductor Defects in Hardware Logic with Security-Sensitive Implicationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1248

has super-classes
Protection Mechanism Failure c

Sender MTA Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SenderMTAReputationAnalysis

has super-classes
Message Analysis c
is also defined as
named individual

Sender Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SenderReputationAnalysis

has super-classes
Message Analysis c
is also defined as
named individual

Sensitive Cookie in HTTPS Session Without 'Secure' Attributec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-614

has super-classes
Cleartext Transmission of Sensitive Information c

Sensitive Cookie with Improper SameSite Attributec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1275

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c

Sensitive Cookie Without 'HttpOnly' Flagc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1004

has super-classes
Incorrect Permission Assignment for Critical Resource c

Sensitive Data Storage in Improperly Locked Memoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-591

has super-classes
Improper Resource Locking c

Sensitive Information in Resource Not Removed Before Reusec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-226

has super-classes
Improper Removal of Sensitive Information Before Storage or Transfer c, Incomplete Cleanup c
has sub-classes
Improper Clearing of Heap Memory Before Release ('Heap Inspection') c, Improper Zeroization of Hardware Register c, Information Exposure through Microarchitectural State after Transient Execution c, Insufficient or Incomplete Data Removal within Hardware Component c, Sensitive Information Uncleared Before Debug/Power State Transition c

Sensitive Information Uncleared Before Debug/Power State Transitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1272

has super-classes
Sensitive Information in Resource Not Removed Before Reuse c

Sensitive Non-Volatile Information Not Protected During Debugc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1243

has super-classes
Improper Physical Access Control c

Sensorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Sensor

has super-classes
D3FEND Thing c, Digital Artifact c
has sub-classes
Cloud Service Sensor c, Endpoint Sensor c, Network Sensor c

SeqGANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SeqGAN

has super-classes
Generative Adversarial Network c
is also defined as
named individual

Sequence of Processor Instructions Leads to Unexpected Behaviorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1281

has super-classes
Insufficient Control Flow Management c

Serializable Class Containing Sensitive Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-499

has super-classes
Exposure of Resource to Wrong Sphere c

Serializable Data Element Containing non-Serializable Item Elementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1070

has super-classes
Improper Adherence to Coding Standards c

Serialization Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SerializationFunction

has super-classes
Subroutine c

Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Server

has super-classes
Host c
has sub-classes
Authentication Server c, Computing Server c, DHCP Server c, DNS Server c, Database Server c, File Server c, Mail Server c, Media Server c, Network Time Server c, Orchestration Server c, Print Server c, Proxy Server c, TFTP Server c, VPN Server c, Web Server c
is also defined as
named individual

Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.004

has super-classes
Acquire Infrastructure c

Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.004

has super-classes
Compromise Infrastructure c

Server Software Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505

has super-classes
Persistence Technique c
has sub-classes
IIS Components c, SQL Stored Procedures c, Terminal Services DLL c, Transport Agent c, Web Shell c

Server-generated Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-550

has super-classes
Generation of Error Message Containing Sensitive Information c

Server-Side Request Forgery (SSRF)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-918

has super-classes
Unintended Proxy or Intermediary ('Confused Deputy') c
is also defined as
named individual

Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Service

has super-classes
Capability Implementation c
has sub-classes
Software Service c

Service Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceApplication

has super-classes
Application c
has sub-classes
Container Orchestration Software c, Container Runtime c, Credential Management System c, Software Deployment Tool c, Virtualization Software c, Web Server Application c
is also defined as
named individual

Service Application Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceApplicationProcess

has super-classes
Application Process c
has sub-classes
Authentication Service c, Authorization Service c, Network Service c
is also defined as
named individual

Service Binary Verificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceBinaryVerification

has super-classes
System File Analysis c
is also defined as
named individual

Service Dependencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceDependency

has super-classes
Dependency c
is also defined as
named individual

Service Dependency Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceDependencyMapping

has super-classes
System Mapping c
is also defined as
named individual

Service Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1035

has super-classes
Execution Technique c

Service Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1569.002

has super-classes
System Services c

Service Exhaustion Floodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1499.002

has super-classes
Network Denial of Service c
is also defined as
named individual

Service Providerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ServiceProvider

has super-classes
Provider c

Service Registry Permissions Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1058

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Service Stopc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1489

has super-classes
Impact Technique c

Services File Permissions Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.010

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Services Registry Permissions Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1574.011

has super-classes
Hijack Execution Flow c
is also defined as
named individual

Servlet Runtime Error Message Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-536

has super-classes
Externally-Generated Error Message Containing Sensitive Information c

Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Session

Is defined by
http://dbpedia.org/resource/Session_(computer_science)
has super-classes
Digital Artifact c
has sub-classes
Login Session c

Session Cookiec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SessionCookie

has super-classes
Credential c
is also defined as
named individual

Session Duration Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SessionDurationAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

Session Fixationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-384

has super-classes
Externally Controlled Reference to a Resource in Another Sphere c

Set System Config Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SetSystemConfigValue

has super-classes
System Config System Call c
has members
reg set key value a ni, reg set key value w ni, reg set value a ni, reg set value ex a ni, reg set value ex w ni, reg set value w ni
is also defined as
named individual

Setuid and Setgidc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1166

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Setuid and Setgidc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1548.001

has super-classes
Abuse Elevation Control Mechanism c
is also defined as
named individual

Severity Typec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-SeverityType

Qualitative Severity Rating
Specifies the CVSS base, temporal, threat, or environmental severity type.
is equivalent to
{ Critical , High , Low , Medium , None }
has super-classes
CVSS Metric c
is in range of
severity op
has members
Critical ni, High ni, Low ni, Medium ni, None ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, User Interaction c

SHA-1 Hashc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/SHA1

SHA-1 cryptographic hash value
has super-classes
Hash c

SHA-256 Hashc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/SHA256

SHA-256 cryptographic hash value
has super-classes
Hash c

SHA-512 Hashc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/SHA512

has super-classes
Hash c

Shadow Stackc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ShadowStack

has super-classes
Digital Artifact c
is also defined as
named individual

Shadow Stack Comparisonsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ShadowStackComparisons

has super-classes
Process Analysis c
is also defined as
named individual

Shared Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SharedComputer

has super-classes
Client Computer c
has sub-classes
Kiosk Computer c, Network Printer c, Operations Center Computer c, Thin Client Computer c

Shared Library Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SharedLibraryFile

has super-classes
Object File c
has sub-classes
Operating System Shared Library File c
is also defined as
named individual

Shared Modules Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1129

has super-classes
Execution Technique c

Shared Resource Access Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SharedResourceAccessFunction

has super-classes
Subroutine c
is also defined as
named individual

Sharepointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1213.002

has super-classes
Data from Information Repositories c
is also defined as
named individual

Shimc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Shim

has super-classes
Software c
has sub-classes
Application Shim c
is also defined as
named individual

Shim Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ShimDatabase

has super-classes
Application Configuration Database c
is also defined as
named individual

Shortcut Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ShortcutFile

has super-classes
File c
has sub-classes
Windows Shortcut File c

Shortcut Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1023

has super-classes
Persistence Technique c

Shortcut Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.009

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

SID-History Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134.005

has super-classes
Access Token Manipulation c
is also defined as
named individual

SID-History Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1178

has super-classes
Privilege Escalation Technique c

Sigma Rulec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Sigma

has super-classes
Detection Rule c

Signal Handler Function Associated with Multiple Signalsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-831

has super-classes
Signal Handler Race Condition c

Signal Handler Race Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-364

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c
has sub-classes
Dangerous Signal Handler not Disabled During Sensitive Operations c, Signal Handler Function Associated with Multiple Signals c, Signal Handler with Functionality that is not Asynchronous-Safe c

Signal Handler Use of a Non-reentrant Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-479

has super-classes
Signal Handler with Functionality that is not Asynchronous-Safe c, Use of a Non-reentrant Function in a Concurrent Context c

Signal Handler with Functionality that is not Asynchronous-Safec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-828

has super-classes
Signal Handler Race Condition c
has sub-classes
Signal Handler Use of a Non-reentrant Function c

Signaturec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Signature

has super-classes
Detection Rule c

Signed Binary Proxy Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218

has super-classes
Defense Evasion Technique c, Execution Technique c
has sub-classes
CMSTP c, Compiled HTML File c, Control Panel Execution c, InstallUtil Execution c, MMC c, Mavinject c, Mshta Execution c, Msiexec Execution c, Odbcconf Execution c, Regsvcs/Regasm Execution c, Regsvr32 Execution c, Rundll32 Execution c, Verclsid c

Signed Script Proxy Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1216

has super-classes
Defense Evasion Technique c, Execution Technique c
has sub-classes
PubPrn Execution c

Signed to Unsigned Conversion Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-195

has super-classes
Incorrect Conversion between Numeric Types c

Silver Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1558.002

has super-classes
Steal or Forge Kerberos Tickets c

Simulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Simulation

has super-classes
Media Generation c
is disjoint with
Media Generation c

Singleton Class Instance Creation without Proper Locking or Synchronizationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1096

has super-classes
Missing Synchronization c

Singular Value Decompositionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SingularValueDecomposition

has super-classes
Dimension Reduction c
is also defined as
named individual

SIP and Trust Provider Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1198

has super-classes
Defense Evasion Technique c, Persistence Technique c

SIP and Trust Provider Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553.003

has super-classes
Subvert Trust Controls c
is also defined as
named individual

Skewnessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Skewness

has super-classes
Distribution Properties c
is disjoint with
Kurtosis c, Moments c
is also defined as
named individual

Small Seed Space in PRNGc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-339

has super-classes
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) c

Small Space of Random Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-334

has super-classes
Use of Insufficiently Random Values c
has sub-classes
J2EE Misconfiguration: Insufficient Session-ID Length c

SMB/Windows Admin Sharesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.002

has super-classes
Remote Services c

SNMP (MIB Dump)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1602.001

has super-classes
Data from Configuration Repository c

Social Mediac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1593.001

has super-classes
Search Open Websites/Domains c

Social Media Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1585.001

has super-classes
Establish Accounts c

Social Media Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1586.001

has super-classes
Compromise Accounts c

Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Software

has super-classes
Digital Artifact c
has sub-classes
Application c, Firmware c, Malicious Software c, Network Agent c, OS API Function c, OS API Private Function c, Shim c, Software Library c, Software Patch c, Subroutine c, System Service Software c, System Software c, Utility Software c
has members
Android ni
is also defined as
named individual

Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1592.002

has super-classes
Gather Victim Host Information c

Software Artifact Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareArtifactServer

has super-classes
Artifact Server c

Software Deployment Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareDeploymentTool

has super-classes
Service Application c
is also defined as
named individual

Software Deployment Tools Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1072

has super-classes
Execution Technique c, Lateral Movement Technique c
is also defined as
named individual

Software Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1518

has super-classes
Discovery Technique c
has sub-classes
Security Software Discovery c

Software Inventoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareInventory

has super-classes
Asset Inventory c
is also defined as
named individual

Software Libraryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareLibrary

has super-classes
Software c
is also defined as
named individual

Software Library Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareLibraryFile

has super-classes
File c
is also defined as
named individual

Software Packagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwarePackage

has super-classes
Digital Artifact c
has sub-classes
Container Image c, Java Archive c, NPM Package c, Python Package c

Software Packaging Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwarePackagingTool

has super-classes
Build Tool c
has sub-classes
Container Build Tool c, Operating System Packaging Tool c

Software Packingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.002

has super-classes
Obfuscated Files or Information c
is also defined as
named individual

Software Packingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1045

has super-classes
Defense Evasion Technique c

Software Patchc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwarePatch

Is defined by
http://dbpedia.org/resource/Patch_(computing)
has super-classes
Software c

Software Productc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareProduct

has super-classes
Product c
has members
.net framework ni, Docker ni, HTTP server application ni, Windows 11 ni, Wireshark ni, chrome ni, kubernetes software ni, network connections ni, python software ni, windows 10 1607 ni

Software Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareService

has super-classes
Service c

Software Updatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoftwareUpdate

has super-classes
Platform Hardening c
is also defined as
named individual

Somers' Dc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SomersD

has super-classes
Rank Correlation c
is also defined as
named individual

Soundex Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SoundexMatching

has super-classes
Partial Matching c
is also defined as
named individual

Source Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SourceCode

has super-classes
Information Content Entity c
is also defined as
named individual

Source Code Analyzer Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SourceCodeAnalyzerTool

has super-classes
Static Analysis Tool c

Source Code Element without Standard Prologuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1115

has super-classes
Inappropriate Source Code Style or Formatting c

Source Code File with Excessive Number of Lines of Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1080

has super-classes
Excessive Code Complexity c

Source Code Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SourceCodeReference

has super-classes
Technique Reference c
has members
Reference - Munin ni, Reference - OS Query Windows User Collection Code ni

Space after Filenamec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1036.006

has super-classes
Masquerading c
is also defined as
named individual

Space after Filenamec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1151

has super-classes
Defense Evasion Technique c, Execution Technique c

Spearman's Rank Correlation Coefficientc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SpearmansRankCorrelationCoefficient

has super-classes
Rank Correlation c
is also defined as
named individual

Spearphishing Attachmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1193

has super-classes
Initial Access Technique c

Spearphishing Attachmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1566.001

has super-classes
Phishing c
is also defined as
named individual

Spearphishing Attachmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1598.002

has super-classes
Phishing for Information c

Spearphishing Linkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1192

has super-classes
Initial Access Technique c

Spearphishing Linkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1566.002

has super-classes
Phishing c
is also defined as
named individual

Spearphishing Linkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1598.003

has super-classes
Phishing for Information c

Spearphishing Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1598.001

has super-classes
Phishing for Information c

Spearphishing via Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1194

has super-classes
Initial Access Technique c

Spearphishing Via Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1566.003

has super-classes
Phishing c
is also defined as
named individual

Specificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Specification

has super-classes
Document c

Specification Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SpecificationReference

has super-classes
Technique Reference c
has members
Reference - An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks ni, Reference - DNS Whitelist (DNSWL) Email Authentication Method Extension ni, Reference - IEEE Standard for Local and Metropolitan Area Networks - Station and Media Access Control Connectivity Discovery ni, Reference - LUKS1 On-Disk Format SpecificationVersion 1.2.3 ni, Reference - Pointer Authentication on ARMv8.3 ni, Reference - PsSuspend - Microsoft ni, Reference - RFC 2289 - A One-Time Password System ni, Reference - RFC 6376: DomainKeys Identified Mail (DKIM) Signatures - IETF ni, Reference - RFC 7208: Sender Policy Framework (SPF) for Authorizing Use of Domains in Email - IETF ni, Reference - RFC 7489: Domain-based Message Authentication, Reporting, and Conformance (DMARC) - IETF ni, Reference - RFC 7642: System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements ni, Reference - Revoke a previously issued verifiable credential - Microsoft ni, Reference - Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 ni, Reference - Security Architecture for the Internet Protocol ni, Reference - TCG Trusted Attestation Protocol Use Cases for TPM Families 1.2 and 2.0 and DICE ni, Reference - TPM 2.0 Library Specification - Trusted Computing Group, Incorporated ni, Reference - Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities ni, Reference - Trusted Attestation Protocol Use Cases ni, Reference - UEFI Platform Initialization (PI) Specification ni, Reference - Unified Architecture Framework (UAF) ni, Reference - Web Authentication: An API for accessing Public Key Credentials Level 2 ni, Reference - Web-Based Enterprise Management ni, Reference - Windows Management Infrastructure (MI) ni, Reference - Windows Management Instrumentation (WMI) ni

Spectral Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SpectralClustering

has super-classes
Graph-based Clustering c
is also defined as
named individual

Spywarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-512

has super-classes
Embedded Malicious Code c

SQL Injection: Hibernatec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-564

has super-classes
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') c

SQL Stored Proceduresc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505.001

has super-classes
Server Software Component c
is also defined as
named individual

SSHc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.004

has super-classes
Remote Services c
is also defined as
named individual

SSH Authorized Keysc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1098.004

has super-classes
Account Manipulation c

SSH Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1184

has super-classes
Lateral Movement Technique c

SSH Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1563.001

has super-classes
Remote Service Session Hijacking c
is also defined as
named individual

SSH Sessionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SSHSession

has super-classes
Remote Session c
is also defined as
named individual

Stack Componentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StackComponent

has super-classes
Digital Artifact c
has sub-classes
Saved Instruction Pointer c, Stack Frame c, Stack Frame Canary c

Stack Framec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StackFrame

has super-classes
Stack Component c
is also defined as
named individual

Stack Frame Canaryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StackFrameCanary

has super-classes
Stack Component c
is also defined as
named individual

Stack Frame Canary Validationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StackFrameCanaryValidation

has super-classes
Application Hardening c
has members
GNU GCC StackGuard ni, Microsoft VCCLCompilerTool BufferSecurityCheck ni
is also defined as
named individual

Stack Segmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StackSegment

has super-classes
Process Segment c
is also defined as
named individual

Stack-based Buffer Overflowc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-121

has super-classes
Access of Memory Location After End of Buffer c, Out-of-bounds Write c

Stackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Stacking

has super-classes
Ensemble Learning c
is also defined as
named individual

Stage Capabilitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608

has super-classes
Resource Development Technique c
has sub-classes
Drive-by Target c, Install Digital Certificate c, Link Target c, Upload Malware c, Upload Tool c

Standalone Honeynetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StandaloneHoneynet

has super-classes
Decoy Environment c
is also defined as
named individual

Standard Cryptographic Protocolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1032

has super-classes
Command and Control Technique c

Standard Deviationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StandardDeviation

has super-classes
Variability c
is disjoint with
Coefficient of Variation c, Interquartile Range c, Mean Absolute Deviation c, Median Absolute Deviation c, Range c, Variance c
is also defined as
named individual

Standard Encodingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1132.001

has super-classes
Data Encoding c

Startup Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StartupDirectory

has super-classes
Directory c, Local Resource c

Startup Itemsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1037.005

has super-classes
Boot or Logon Initialization Scripts c
is also defined as
named individual

Startup Itemsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1165

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Statementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Statement

Is defined by
http://semanticscience.org/resource/SIO_001183
has super-classes
Proposition c
has sub-classes
Capability Feature Claim c

Static Analysis Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StaticAnalysisTool

Is defined by
http://dbpedia.org/resource/Static_program_analysis
has super-classes
Code Analyzer c
has sub-classes
Source Code Analyzer Tool c

Static Member Data Element outside of a Singleton Class Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1042

has super-classes
Inefficient CPU Computation c

Statistical Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StatisticalMethod

has super-classes
Analytic Technique c
has sub-classes
Bayesian Method c, Descriptive Statistics c, Inferential Statistics c, Multivariate Analysis c, Regression Analysis c, Time Series Analysis c
is also defined as
named individual

Steal Application Access Tokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1528

has super-classes
Credential Access Technique c
is also defined as
named individual

Steal or Forge Kerberos Ticketsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1558

has super-classes
Credential Access Technique c
has sub-classes
AS-REP Roasting c, Golden Ticket c, Kerberoasting c, Silver Ticket c
is also defined as
named individual

Steal Web Session Cookiec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1539

has super-classes
Credential Access Technique c
is also defined as
named individual

Steganographyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1001.002

has super-classes
Data Obfuscation c

Steganographyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1027.003

has super-classes
Obfuscated Files or Information c

stepc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Step

has super-classes
D3FEND Thing c
has sub-classes
Use Case Step c
has members
Step 1 - Copy Token ni, Step 2 - Impersonate User ni

Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Storage

has super-classes
Digital Artifact c
has sub-classes
Primary Storage c, Secondary Storage c
is also defined as
named individual

Storage of File With Sensitive Data Under FTP Rootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-220

has super-classes
Files or Directories Accessible to External Parties c

Storage of File with Sensitive Data Under Web Rootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-219

has super-classes
Files or Directories Accessible to External Parties c
has sub-classes
Unparsed Raw Web Content Delivery c

Storage of Sensitive Data in a Mechanism without Access Controlc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-921

has super-classes
Insecure Storage of Sensitive Information c

Stored Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1492

has super-classes
Impact Technique c

Stored Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1565.001

has super-classes
Data Manipulation c
is also defined as
named individual

Stored Procedurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StoredProcedure

has super-classes
Subroutine c
is also defined as
named individual

Storing Passwords in a Recoverable Formatc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-257

has super-classes
Insufficiently Protected Credentials c

String Equivalence Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StringEquivalenceMatching

has super-classes
Equivalence Matching c, String Pattern Matching c
is also defined as
named individual

String Format Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StringFormatFunction

has super-classes
Subroutine c

String Pattern Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StringPatternMatching

has super-classes
Pattern Matching c
has sub-classes
Partial Matching c, String Equivalence Matching c
is also defined as
named individual

Strong Password Policyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StrongPasswordPolicy

has super-classes
Credential Hardening c
is also defined as
named individual

Struts: Duplicate Validation Formsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-102

has super-classes
Improper Use of Validation Framework c, Use of Multiple Resources with Duplicate Identifier c

Struts: Form Bean Does Not Extend Validation Classc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-104

has super-classes
Improper Following of Specification by Caller c

Struts: Form Field Without Validatorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-105

has super-classes
Improper Use of Validation Framework c

Struts: Incomplete validate() Method Definitionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-103

has super-classes
Improper Following of Specification by Caller c

Struts: Non-private Field in ActionForm Classc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-608

has super-classes
Exposure of Resource to Wrong Sphere c

Struts: Plug-in Framework not in Usec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-106

has super-classes
Improper Use of Validation Framework c

Struts: Unused Validation Formc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-107

has super-classes
Irrelevant Code c

Struts: Unvalidated Action Formc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-108

has super-classes
Improper Use of Validation Framework c

Struts: Validator Turned Offc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-109

has super-classes
Improper Use of Validation Framework c

Struts: Validator Without Form Fieldc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-110

has super-classes
Irrelevant Code c

StyleGANc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#StyleGAN

has super-classes
Image Synthesis GAN c
is also defined as
named individual

Subroutinec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Subroutine

has super-classes
Mekanoid Thing c, Software c
has sub-classes
Authentication Function c, Console Output Function c, Copy Memory Function c, Deserialization Function c, Eval Function c, Exception Handler c, External Content Inclusion Function c, File Path Open Function c, Import Library Function c, Input Function c, Log Message Function c, Mathematical Function c, Memory Allocation Function c, Memory Free Function c, Pointer Dereferencing Function c, Process Start Function c, Raw Memory Access Function c, Serialization Function c, Shared Resource Access Function c, Stored Procedure c, String Format Function c, Thread Start Function c
is also defined as
named individual

Subspace Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SubspaceClustering

has super-classes
Correlation Clustering c
is also defined as
named individual

Substring Matchingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SubstringMatching

has super-classes
Partial Matching c
is also defined as
named individual

Subvert Trust Controlsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1553

has super-classes
Defense Evasion Technique c
has sub-classes
Code Signing c, Code Signing Policy Modification c, Gatekeeper Bypass c, Install Root Certificate c, Mark-of-the-Web Bypass c, SIP and Trust Provider Hijacking c

Sudoc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1169

has super-classes
Privilege Escalation Technique c

Sudo and Sudo Cachingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1548.003

has super-classes
Abuse Elevation Control Mechanism c
is also defined as
named individual

Sudo Cachingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1206

has super-classes
Privilege Escalation Technique c

Summarizingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Summarizing

has super-classes
Analytical Purpose c
has sub-classes
Clustering c, Grouping c, Histogramming c
is disjoint with
Classifying c, Forecasting c, Media Generation c, Matching c

Supervised Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SupervisedLearning

has super-classes
Machine Learning c
has sub-classes
Classification c, Regression Analysis Learning c
is also defined as
named individual

Supply Chain Compromisec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1195

has super-classes
Initial Access Technique c
has sub-classes
Compromise Hardware Supply Chain c, Compromise Software Dependencies and Development Tools c, Compromise Software Supply Chain c
is also defined as
named individual

Support Vector Machine Classificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SupportVectorMachineClassification

has super-classes
Classification c
is also defined as
named individual

Suspend Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SuspendProcess

has super-classes
System Call c
is also defined as
named individual

Suspend Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SuspendThread

has super-classes
System Call c
is also defined as
named individual

Suspicious Commentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-546

has super-classes
Inappropriate Source Code Style or Formatting c

Switchc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Switch

Is defined by
http://dbpedia.org/resource/Network_switch
has super-classes
Network Node c

Symbolic AIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SymbolicAI

has super-classes
Symbolic Logic c
has sub-classes
Description Logic c, Fuzzy Logic c, Logic Programming c, Modal Logic c, Non-monotonic Logic c, Predicate Logic c, Probabilistic Logic c, Propositional Logic c
is also defined as
named individual

Symbolic Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SymbolicLogic

has super-classes
Analytic Technique c
has sub-classes
Logical Rules c, Symbolic AI c
is also defined as
named individual

Symbolic Name not Mapping to Correct Objectc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-386

has super-classes
Use of Incorrectly-Resolved Name or Reference c

Symmetric Cryptographyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1573.001

has super-classes
Encrypted Channel c
is also defined as
named individual

Symmetric Feature-based Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SymmetricFeature-basedTransferLearning

has super-classes
Homogenous Transfer Learning c
is also defined as
named individual

Symmetric Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SymmetricKey

has super-classes
Cryptographic Key c

Synchronous Access of Remote Resource without Timeoutc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1088

has super-classes
Incorrect Synchronization c

Systemc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#System

Is defined by
http://wordnet-rdf.princeton.edu/id/04384144-n
has super-classes
Artifact c
has sub-classes
Digital System c

System Callc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemCall

has super-classes
Digital Artifact c, Digital Event c
has sub-classes
Allocate Memory c, Authenticate User c, Connect Socket c, Copy Token c, Create File c, Create Process c, Create Socket c, Create Thread c, Delete File c, Exec c, Free Memory c, Get Open Sockets c, Get Open Windows c, Get Running Processes c, Get Screen Capture c, Get System Time c, Impersonate User c, Logon User c, Move File c, Open File c, Read File c, Suspend Process c, Suspend Thread c, System Config System Call c, Terminate Process c, Trace Process c, Write File c
is also defined as
named individual

System Call Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemCallAnalysis

has super-classes
Process Analysis c
has sub-classes
File Creation Analysis c
has members
File Creation Analysis ni
is also defined as
named individual

System Call Filteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemCallFiltering

has super-classes
Kernel-based Process Isolation c
is also defined as
named individual

System Checksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1497.001

has super-classes
Virtualization/Sandbox Evasion c

System Config System Callc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigSystemCall

has super-classes
System Call c
has sub-classes
Get System Config Value c, Set System Config Value c

System Configuration Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigurationDatabase

has super-classes
Database c
has sub-classes
Windows Registry c
is also defined as
named individual

System Configuration Database Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigurationDatabaseRecord

has super-classes
Configuration Database Record c, Operating System Configuration Component c
has sub-classes
System Configuration Init Database Record c, Windows Registry Key c, Windows Registry Value c
is also defined as
named individual

System Configuration Init Database Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigurationInitDatabaseRecord

has super-classes
System Configuration Database Record c, System Configuration Init Resource c, System Init Configuration c
is also defined as
named individual

System Configuration Init Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigurationInitResource

has super-classes
Local Resource c
has sub-classes
System Configuration Init Database Record c, System Init Script c, System Startup Directory c

System Configuration Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemConfigurationPermissions

has super-classes
Platform Hardening c
is also defined as
named individual

System Daemon Monitoringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemDaemonMonitoring

has super-classes
Operating System Monitoring c
is also defined as
named individual

System Dependencyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemDependency

has super-classes
Dependency c
is also defined as
named individual

System Dependency Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemDependencyMapping

has super-classes
System Mapping c
is also defined as
named individual

System File Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemFileAnalysis

has super-classes
Operating System Monitoring c
has sub-classes
Service Binary Verification c
has members
Service Binary Verification ni
is also defined as
named individual

System Firewall Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemFirewallConfiguration

has super-classes
Operating System Configuration Component c
is also defined as
named individual

System Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemFirmware

has super-classes
Firmware c
is also defined as
named individual

System Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1019

has super-classes
Persistence Technique c

System Firmwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542.001

has super-classes
Pre-OS Boot c
is also defined as
named individual

System Firmware Verificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemFirmwareVerification

has super-classes
Firmware Verification c
is also defined as
named individual

System Information Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1082

has super-classes
Discovery Technique c
is also defined as
named individual

System Init Config Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemInitConfigAnalysis

has super-classes
Operating System Monitoring c
is also defined as
named individual

System Init Configurationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemInitConfiguration

has super-classes
Operating System Configuration Component c
has sub-classes
System Configuration Init Database Record c, System Init Script c, System Startup Directory c
is also defined as
named individual

System Init Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemInitProcess

has super-classes
Operating System Process c

System Init Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemInitScript

has super-classes
Executable Script c, System Configuration Init Resource c, System Init Configuration c
is also defined as
named individual

System Language Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1614.001

has super-classes
System Location Discovery c
is also defined as
named individual

System Location Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1614

has super-classes
Discovery Technique c
has sub-classes
System Language Discovery c
is also defined as
named individual

System Mappingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemMapping

has super-classes
Defensive Technique c
has sub-classes
Data Exchange Mapping c, Service Dependency Mapping c, System Dependency Mapping c, System Vulnerability Assessment c
has members
Data Exchange Mapping ni, Service Dependency Mapping ni, System Dependency Mapping ni, System Vulnerability Assessment ni
is also defined as
named individual

System Network Configuration Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1016

has super-classes
Discovery Technique c
has sub-classes
Internet Connection Discovery c
is also defined as
named individual

System Network Connections Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1049

has super-classes
Discovery Technique c
is also defined as
named individual

System Owner/User Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1033

has super-classes
Discovery Technique c
is also defined as
named individual

System Password Databasec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemPasswordDatabase

has super-classes
Password Database c
is also defined as
named individual

System Service Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1007

has super-classes
Discovery Technique c
is also defined as
named individual

System Service Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemServiceSoftware

has super-classes
Software c
has sub-classes
Job Scheduler Software c, Local Authentication Service c, Local Authorization Service c
is also defined as
named individual

System Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1569

has super-classes
Execution Technique c
has sub-classes
Launchctl c, Service Execution c

System Shutdown/Rebootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1529

has super-classes
Impact Technique c

System Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemSoftware

has super-classes
Software c
has sub-classes
Host-based Firewall c, Kernel c

System Startup Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemStartupDirectory

has super-classes
Directory c, System Configuration Init Resource c, System Init Configuration c
is also defined as
named individual

System Time Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemTimeApplication

has super-classes
Utility Software c
is also defined as
named individual

System Time Discoveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1124

has super-classes
Discovery Technique c
is also defined as
named individual

System Utilization Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemUtilizationRecord

has super-classes
Record c

System Vulnerability Assessmentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#SystemVulnerabilityAssessment

has super-classes
System Mapping c
is also defined as
named individual

System-on-Chip (SoC) Using Components without Unique, Immutable Identifiersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1192

has super-classes
Violation of Secure Design Principles c

Systemd Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1501

has super-classes
Persistence Technique c

Systemd Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1543.002

has super-classes
Create or Modify System Process c
is also defined as
named individual

Systemd Timersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1053.006

has super-classes
Scheduled Task/Job Execution c

t-SNE Clusteringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#t-SNEClustering

has super-classes
Projection-based Clustering c
is also defined as
named individual

Tablet Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TabletComputer

Is defined by
http://dbpedia.org/resource/Tablet_computer
has super-classes
Personal Computer c

Taint Shared Contentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1080

has super-classes
Lateral Movement Technique c
is also defined as
named individual

Target Audiencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TargetAudience

has super-classes
D3FEND Use Case Thing c
is disjoint with
D3FEND Use Case c, Use Case Goal c, Use Case Prerequisite c, Use Case Procedure c, Use Case Step c

taskc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Task

An abstract concept. Something to be done.
has super-classes
Mekanoid Object c
is disjoint with
Task Pattern c, Task Run c, Task Run Log c, Task Template c

Task Patternc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/TaskPattern

has super-classes
Mekanoid Object c
is disjoint with
task c, Task Run c, Task Run Log c, Task Template c

Task Runc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/TaskRun

has super-classes
Digital Event c, Mekanoid Object c
has sub-classes
Automated Task Run c, Manual Task Run c
is disjoint with
task c, Task Pattern c, Task Run Log c, Task Template c

Task Run Logc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/TaskRunLog

has super-classes
Event Log c, Mekanoid Object c
is disjoint with
task c, Task Pattern c, Task Run c, Task Template c

Task Templatec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/TaskTemplate

has super-classes
Mekanoid Object c
is disjoint with
task c, Task Pattern c, Task Run c, Task Run Log c

Techniquec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Technique

has super-classes
D3FEND Thing c
has sub-classes
Defensive Technique c, Offensive Technique c
is in domain of
kb-article
is in range of
kb-reference-of op
has members
Defensive Technique ni

Technique Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TechniqueReference

has super-classes
D3FEND Thing c
has sub-classes
Academic Paper Reference c, Book Reference c, External Knowledge Base c, Internet Article Reference c, Patent Reference c, Policy Reference c, Source Code Reference c, Specification Reference c, User Manual Reference c
has members
Reference - Certificate Transparency ni, Reference - Certificate and Public Key Pinning ni, Reference - FWTK Documentation - fwtk.org ni, Reference - StreamingPhish ni, Reference - Use Rkill to Stop Malware Processes - ghacks.net ni

Template Injectionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1221

has super-classes
Defense Evasion Technique c

Temporal Difference Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TemporalDifferenceLearning

has super-classes
Model-free Reinforcement Learning c
has sub-classes
Actor-Critic c
is also defined as
named individual

Temporal Logicc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TemporalLogic

has super-classes
Modal Logic c
is also defined as
named individual

tenantc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Tenant

Mekanoid Tenant
has super-classes
Mekanoid Object c

Terminal Services DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505.005

has super-classes
Server Software Component c

Terminate Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TerminateProcess

has super-classes
System Call c
is also defined as
named individual

Tertiary Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TertiaryStorage

Is defined by
https://en.wikipedia.org/wiki/Computer_data_storage#Tertiary_storage
has super-classes
Hardware Device c, Memory Block c, Secondary Storage c

Test Execution Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TestExecutionTool

Is defined by
http://dbpedia.org/resource/Test_execution_engine
has super-classes
Developer Application c
has sub-classes
Integration Test Execution Tool c, Unit Test Execution Tool c

TFTP Bootc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1542.005

has super-classes
Pre-OS Boot c
is also defined as
named individual

TFTP Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TFTPNetworkTraffic

has super-classes
Network Traffic c
is also defined as
named individual

TFTP Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TFTPServer

Is defined by
http://dbpedia.org/resource/Trivial_File_Transfer_Protocol
has super-classes
Server c

The UI Performs the Wrong Actionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-449

has super-classes
UI Discrepancy for Security Feature c

Thin Client Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ThinClientComputer

Is defined by
http://dbpedia.org/resource/Thin_client
has super-classes
Shared Computer c
has sub-classes
Zero Client Computer c

Threadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Thread

has super-classes
Digital Artifact c
is also defined as
named individual

Thread Execution Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.003

has super-classes
Process Injection c
is also defined as
named individual

Thread Local Storagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.005

has super-classes
Process Injection c
is also defined as
named individual

Thread Start Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ThreadStartFunction

has super-classes
Subroutine c
is also defined as
named individual

Threat Intel Vendorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1597.001

has super-classes
Search Closed Sources c

Ticketc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Ticket

has super-classes
Actionable Item c

Ticket Granting Ticketc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TicketGrantingTicket

Is defined by
http://dbpedia.org/resource/Ticket_Granting_Ticket
has super-classes
Access Token c
has sub-classes
Kerberos Ticket Granting Ticket c

Time Based Evasionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1497.003

has super-classes
Virtualization/Sandbox Evasion c
is also defined as
named individual

Time Providersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1209

has super-classes
Persistence Technique c

Time Providersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.003

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Time Series Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TimeSeriesAnalysis

has super-classes
Statistical Method c
has sub-classes
ARIMA Model c, ARMA Model c, Autoregressive Model c, Moving Average Model c
has members
ARMA Model ni
is also defined as
named individual

Time-of-check Time-of-use (TOCTOU) Race Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-367

has super-classes
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') c
has sub-classes
Race Condition Enabling Link Following c

Timestompc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1070.006

has super-classes
Indicator Removal on Host c
is also defined as
named individual

Timestompc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1099

has super-classes
Defense Evasion Technique c

Token Impersonation/Theftc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1134.001

has super-classes
Access Token Manipulation c
is also defined as
named individual

Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.002

has super-classes
Obtain Capabilities c

TPM Boot Integrityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TPMBootIntegrity

has super-classes
Platform Hardening c
is also defined as
named individual

Trace Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TraceProcess

has super-classes
System Call c
is also defined as
named individual

Traffic Duplicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1020.001

has super-classes
Automated Exfiltration c

Traffic Signalingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1205

has super-classes
Command and Control Technique c, Defense Evasion Technique c, Persistence Technique c
has sub-classes
Port Knocking c
is also defined as
named individual

Trajectory Predictionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TrajectoryPrediction

has super-classes
Forecasting c

Transfer Agent Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TransferAgentAuthentication

has super-classes
Message Hardening c
is also defined as
named individual

Transfer Data to Cloud Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1537

has super-classes
Exfiltration Technique c

Transfer Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TransferLearning

has super-classes
Machine Learning c
has sub-classes
Heterogeneous Transfer Learning c, Homogenous Transfer Learning c
is also defined as
named individual

Transformer-based Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Transformer-basedLearning

has super-classes
Machine Learning c
has sub-classes
BERT c, GPT c, Transformer-XL c
is also defined as
named individual

Transformer-XLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Transformer-XL

has super-classes
Transformer-based Learning c
is also defined as
named individual

Translation Lookaside Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TranslationLookasideBuffer

has super-classes
Memory Management Unit Component c
is also defined as
named individual

Transmission of Private Resources into a New Sphere ('Resource Leak')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-402

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
Dangling Database Cursor ('Cursor Injection') c, Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak') c

Transmitted Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1493

has super-classes
Impact Technique c

Transmitted Data Manipulationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1565.002

has super-classes
Data Manipulation c
is also defined as
named individual

Transport Agentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505.002

has super-classes
Server Software Component c
is also defined as
named individual

Trapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1154

has super-classes
Execution Technique c, Persistence Technique c

Trapc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.005

has super-classes
Event Triggered Execution c
is also defined as
named individual

Trapdoorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-510

has super-classes
Embedded Malicious Code c

Trimmed Meanc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TrimmedMean

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Harmonic Mean c, Mean c, Median c, Mode c, Weighted Mean c
is also defined as
named individual

Trojan Horsec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-507

has super-classes
Embedded Malicious Code c
has sub-classes
Non-Replicating Malicious Code c, Replicating Malicious Code (Virus or Worm) c

Truncation of Security-relevant Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-222

has super-classes
Information Loss or Omission c

Trust Boundary Violationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-501

has super-classes
Improper Control of a Resource Through its Lifetime c

Trust of System Event Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-360

has super-classes
Insufficient Verification of Data Authenticity c
has sub-classes
Unprotected Windows Messaging Channel ('Shatter') c

Trust Storec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#TrustStore

has super-classes
Digital Artifact c
has sub-classes
Certificate Trust Store c

Trusted Developer Utilities Proxy Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1127

has super-classes
Defense Evasion Technique c
has sub-classes
MSBuild c

Trusted Relationshipc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1199

has super-classes
Initial Access Technique c
is also defined as
named individual

Trusting HTTP Permission Methods on the Server Sidec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-650

has super-classes
Interpretation Conflict c

Two-Factor Authentication Interceptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1111

has super-classes
Credential Access Technique c
is also defined as
named individual

UI Discrepancy for Security Featurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-446

has super-classes
Incorrect Provision of Specified Functionality c
has sub-classes
Obsolete Feature in UI c, The UI Performs the Wrong Action c, Unimplemented or Unsupported Feature in UI c

Unauthorized Error Injection Can Degrade Hardware Redundancyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1334

has super-classes
Improper Access Control c

Uncaught Exceptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-248

has super-classes
Improper Check or Handling of Exceptional Conditions c, Incorrect Control Flow Scoping c
has sub-classes
Uncaught Exception in Servlet c

Uncaught Exception in Servletc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-600

has super-classes
Uncaught Exception c

Uncertainty Samplingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UncertaintySampling

has super-classes
Active Learning c
is also defined as
named individual

Unchecked Error Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-391

has super-classes
Improper Check for Unusual or Exceptional Conditions c

Unchecked Input for Loop Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-606

has super-classes
Improper Validation of Specified Quantity in Input c

Unchecked Return Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-252

has super-classes
Improper Check for Unusual or Exceptional Conditions c

Unchecked Return Value to NULL Pointer Dereferencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-690

has super-classes
NULL Pointer Dereference c

Uncommonly Used Portc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1065

has super-classes
Command and Control Technique c

Unconditional Control Flow Transfer outside of Switch Blockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1075

has super-classes
Excessive Code Complexity c

Uncontrolled Recursionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-674

has super-classes
Excessive Iteration c
has sub-classes
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') c

Uncontrolled Resource Consumptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-400

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Allocation of Resources Without Limits or Throttling c, Improper Restriction of Power Consumption c, Improper Write Handling in Limited-write Non-Volatile Memories c, Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations c, Logging of Excessive Data c, Missing Reference to Active Allocated Resource c

Uncontrolled Search Path Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-427

has super-classes
Exposure of Resource to Wrong Sphere c

Undefined Behavior for Input to APIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-475

has super-classes
Improper Following of Specification by Caller c

Unexpected Sign Extensionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-194

has super-classes
Incorrect Conversion between Numeric Types c

Unexpected Status Code or Return Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-394

has super-classes
Improper Check for Unusual or Exceptional Conditions c

Unimplemented or Unsupported Feature in UIc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-447

has super-classes
Lack of Administrator Control over Security c, UI Discrepancy for Security Feature c

Uninitialized Value on Reset for Registers Holding Security Settingsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1271

has super-classes
Missing Initialization of Resource c

Unintended Proxy or Intermediary ('Confused Deputy')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-441

has super-classes
Externally Controlled Reference to a Resource in Another Sphere c
has sub-classes
Improper Restriction of Rendered UI Layers or Frames c, Server-Side Request Forgery (SSRF) c

Unintended Reentrant Invocation of Non-reentrant Code Via Nested Callsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1265

has super-classes
Insufficient Control Flow Management c

Unit Test Execution Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UnitTestExecutionTool

has super-classes
Test Execution Tool c

UNIX Hard Linkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-62

has super-classes
Improper Link Resolution Before File Access ('Link Following') c

Unix Shell Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.004

has super-classes
Command and Scripting Interpreter Execution c

UNIX Symbolic Link (Symlink) Followingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-61

has super-classes
Improper Link Resolution Before File Access ('Link Following') c

Unlock Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UnlockAccount

has super-classes
Restore User Account Access c
is also defined as
named individual

Unlock of a Resource that is not Lockedc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-832

has super-classes
Improper Locking c

Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-637

has super-classes
Violation of Secure Design Principles c

Unparsed Raw Web Content Deliveryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-433

has super-classes
Storage of File with Sensitive Data Under Web Root c

Unprotected Alternate Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-420

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c
has sub-classes
Missing Protection Mechanism for Alternate Hardware Interface c, Race Condition During Access to Alternate Channel c, Unprotected Windows Messaging Channel ('Shatter') c

Unprotected Confidential Information on Device is Accessible by OSAT Vendorsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1297

has super-classes
Improper Authorization c

Unprotected Primary Channelc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-419

has super-classes
Improper Restriction of Communication Channel to Intended Endpoints c

Unprotected Transport of Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-523

has super-classes
Insufficiently Protected Credentials c

Unprotected Windows Messaging Channel ('Shatter')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-422

has super-classes
Trust of System Event Data c, Unprotected Alternate Channel c

Unquoted Search Path or Elementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-428

has super-classes
Exposure of Resource to Wrong Sphere c

Unrestricted Externally Accessible Lockc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-412

has super-classes
Improper Locking c

Unrestricted Upload of File with Dangerous Typec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-434

has super-classes
Incorrect Resource Transfer Between Spheres c
is also defined as
named individual

Unsafe ActiveX Control Marked Safe For Scriptingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-623

has super-classes
Privilege Defined With Unsafe Actions c

Unsecured Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1552

has super-classes
Credential Access Technique c
has sub-classes
Bash History c, Cloud Instance Metadata API c, Container API c, Credentials in Files c, Credentials in Registry c, Group Policy Preferences c, Private Keys c
is also defined as
named individual

Unsigned to Signed Conversion Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-196

has super-classes
Incorrect Conversion between Numeric Types c

Unsupervised Learningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UnsupervisedLearning

has super-classes
Machine Learning c
has sub-classes
Association Rule Learning c, Cluster Analysis c, Dimension Reduction c, Generative Adversarial Network c
is also defined as
named individual

Unsupervised Preprocessingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UnsupervisedPreprocessing

has super-classes
Semi-Supervised Learning c
has sub-classes
Semi-supervised Cluster-then-label c, Semi-supervised Feature Extraction c, Semi-supervised Pre-training c
is also defined as
named individual

Unsynchronized Access to Shared Data in a Multithreaded Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-567

has super-classes
Missing Synchronization c

Untrusted Pointer Dereferencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-822

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Untrusted Search Pathc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-426

has super-classes
External Control of Critical State Data c, External Influence of Sphere Definition c

Unused/Unsupported Cloud Regionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1535

has super-classes
Defense Evasion Technique c

Unverified Ownershipc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-283

has super-classes
Improper Ownership Management c

Unverified Password Changec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-620

has super-classes
Weak Authentication c

Upload Malwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608.001

has super-classes
Stage Capabilities c

Upload Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1608.002

has super-classes
Stage Capabilities c

URLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#URL

has super-classes
Identifier c
has members
HTTP URL ni, HTTPS URL ni, Web Socket URL ni
is also defined as
named individual

URL Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#URLAnalysis

has super-classes
Identifier Analysis c
is also defined as
named individual

URL Redirection to Untrusted Site ('Open Redirect')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-601

has super-classes
Externally Controlled Reference to a Resource in Another Sphere c

URL Reputation Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#URLReputationAnalysis

has super-classes
Identifier Reputation Analysis c
is also defined as
named individual

Use After Freec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-416

has super-classes
Expired Pointer Dereference c

Use Alternate Authentication Materialc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1550

has super-classes
Defense Evasion Technique c, Lateral Movement Technique c
has sub-classes
Application Access Token c, Pass The Hash c, Pass The Ticket c, Web Session Cookie c
is also defined as
named individual

Use Case Goalc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UseCaseGoal

has super-classes
D3FEND Use Case Thing c
is in range of
has goal op
has members
Upload ni
is disjoint with
D3FEND Use Case c, Target Audience c, Use Case Prerequisite c, Use Case Procedure c, Use Case Step c

Use Case Prerequisitec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UseCasePrerequisite

has super-classes
D3FEND Use Case Thing c
is disjoint with
D3FEND Use Case c, Target Audience c, Use Case Goal c, Use Case Procedure c, Use Case Step c

Use Case Procedurec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UseCaseProcedure

has super-classes
D3FEND Use Case Thing c, Procedure c
is disjoint with
D3FEND Use Case c, Target Audience c, Use Case Goal c, Use Case Prerequisite c, Use Case Step c

Use Case Stepc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UseCaseStep

has super-classes
D3FEND Use Case Thing c, step c
is disjoint with
D3FEND Use Case c, Target Audience c, Use Case Goal c, Use Case Prerequisite c, Use Case Procedure c

Use of a Broken or Risky Cryptographic Algorithmc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-327

has super-classes
Protection Mechanism Failure c
has sub-classes
Use of Password Hash With Insufficient Computational Effort c, Use of RSA Algorithm without OAEP c, Use of Weak Hash c, Use of a Cryptographic Primitive with a Risky Implementation c

Use of a Cryptographic Primitive with a Risky Implementationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1240

has super-classes
Use of a Broken or Risky Cryptographic Algorithm c

Use of a Key Past its Expiration Datec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-324

has super-classes
Operation on a Resource after Expiration or Release c

Use of a Non-reentrant Function in a Concurrent Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-663

has super-classes
Improper Synchronization c
has sub-classes
Signal Handler Use of a Non-reentrant Function c, Use of getlogin() in Multithreaded Application c

Use of a One-Way Hash with a Predictable Saltc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-760

has super-classes
Use of Password Hash With Insufficient Computational Effort c

Use of a One-Way Hash without a Saltc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-759

has super-classes
Use of Password Hash With Insufficient Computational Effort c

Use of Blocking Code in Single-threaded, Non-blocking Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1322

has super-classes
Excessive Iteration c

Use of Cache Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-524

has super-classes
Exposure of Resource to Wrong Sphere c
has sub-classes
Use of Web Browser Cache Containing Sensitive Information c

Use of Client-Side Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-603

has super-classes
Client-Side Enforcement of Server-Side Security c, Weak Authentication c

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-338

has super-classes
Use of Insufficiently Random Values c

Use of Default Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1392

has super-classes
Use of Weak Credentials c
has sub-classes
Use of Default Cryptographic Key c, Use of Default Password c

Use of Default Cryptographic Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1394

has super-classes
Use of Default Credentials c

Use of Default Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1393

has super-classes
Use of Default Credentials c

Use of Expired File Descriptorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-910

has super-classes
Operation on a Resource after Expiration or Release c

Use of Externally-Controlled Format Stringc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-134

has super-classes
Exposure of Resource to Wrong Sphere c

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-470

has super-classes
Externally Controlled Reference to a Resource in Another Sphere c, Improper Control of Dynamically-Managed Code Resources c

Use of Function with Inconsistent Implementationsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-474

has super-classes
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c
has sub-classes
Call to Non-ubiquitous API c

Use of GET Request Method With Sensitive Query Stringsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-598

has super-classes
Insertion of Sensitive Information Into Sent Data c

Use of getlogin() in Multithreaded Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-558

has super-classes
Use of a Non-reentrant Function in a Concurrent Context c

Use of Hard-coded Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-798

has super-classes
Lack of Administrator Control over Security c, Use of Invariant Value in Dynamically Changing Context c, Use of Weak Credentials c
has sub-classes
Use of Hard-coded Cryptographic Key c, Use of Hard-coded Password c
is also defined as
named individual

Use of Hard-coded Cryptographic Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-321

has super-classes
Use of Hard-coded Credentials c

Use of Hard-coded Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-259

has super-classes
Use of Hard-coded Credentials c

Use of Hard-coded, Security-relevant Constantsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-547

has super-classes
Inappropriate Source Code Style or Formatting c

Use of Implicit Intent for Sensitive Communicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-927

has super-classes
Exposure of Resource to Wrong Sphere c, Improper Authorization c

Use of Incorrect Byte Orderingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-198

has super-classes
Reliance on Data/Memory Layout c

Use of Incorrect Operatorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-480

has super-classes
Always-Incorrect Control Flow Implementation c
has sub-classes
Assigning instead of Comparing c, Comparing instead of Assigning c, Use of Wrong Operator in String Comparison c

Use of Incorrectly-Resolved Name or Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-706

has super-classes
Improper Control of a Resource Through its Lifetime c
has sub-classes
Improper Control of Document Type Definition c, Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') c, Improper Handling of Case Sensitivity c, Improper Handling of File Names that Identify Virtual Resources c, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') c, Improper Link Resolution Before File Access ('Link Following') c, Improper Resolution of Path Equivalence c, Symbolic Name not Mapping to Correct Object c

Use of Inherently Dangerous Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-242

has super-classes
Use of Prohibited Code c

Use of Inner Class Containing Sensitive Datac back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-492

has super-classes
Exposure of Resource to Wrong Sphere c

Use of Insufficiently Random Valuesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-330

has super-classes
Protection Mechanism Failure c
has sub-classes
Generation of Predictable Numbers or Identifiers c, Generation of Weak Initialization Vector (IV) c, Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) c, Insufficient Entropy c, Small Space of Random Values c, Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) c, Use of Invariant Value in Dynamically Changing Context c, Use of Predictable Algorithm in Random Number Generator c

Use of Invariant Value in Dynamically Changing Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-344

has super-classes
Use of Insufficiently Random Values c
has sub-classes
Assignment of a Fixed Address to a Pointer c, Reusing a Nonce, Key Pair in Encryption c, Use of Hard-coded Credentials c

Use of Less Trusted Sourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-348

has super-classes
Insufficient Verification of Data Authenticity c

Use of Low-Level Functionalityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-695

has super-classes
Improper Following of Specification by Caller c
has sub-classes
Direct Use of Unsafe JNI c, EJB Bad Practices: Use of AWT Swing c, EJB Bad Practices: Use of Java I/O c, EJB Bad Practices: Use of Synchronization Primitives c, J2EE Bad Practices: Direct Management of Connections c, J2EE Bad Practices: Direct Use of Sockets c, J2EE Bad Practices: Direct Use of Threads c

Use of Multiple Resources with Duplicate Identifierc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-694

has super-classes
Improper Control of Resource Identifiers ('Resource Injection') c, Improper Following of Specification by Caller c
has sub-classes
Duplicate Key in Associative List (Alist) c, Struts: Duplicate Validation Forms c

Use of Non-Canonical URL Paths for Authorization Decisionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-647

has super-classes
Incorrect Authorization c

Use of NullPointerException Catch to Detect NULL Pointer Dereferencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-395

has super-classes
Improper Handling of Exceptional Conditions c, Incorrect Control Flow Scoping c

Use of Object without Invoking Destructor Methodc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1091

has super-classes
Insufficient Adherence to Expected Conventions c, Missing Release of Resource after Effective Lifetime c

Use of Obsolete Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-477

has super-classes
Improper Adherence to Coding Standards c

Use of Out-of-range Pointer Offsetc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-823

has super-classes
Improper Restriction of Operations within the Bounds of a Memory Buffer c

Use of Password Hash Instead of Password for Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-836

has super-classes
Weak Authentication c

Use of Password Hash With Insufficient Computational Effortc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-916

has super-classes
Use of a Broken or Risky Cryptographic Algorithm c
has sub-classes
Use of a One-Way Hash with a Predictable Salt c, Use of a One-Way Hash without a Salt c

Use of Password System for Primary Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-309

has super-classes
Reliance on a Single Factor in a Security Decision c, Weak Authentication c

Use of Path Manipulation Function without Maximum-sized Bufferc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-785

has super-classes
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') c, Use of Potentially Dangerous Function c

Use of Persistent Cookies Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-539

has super-classes
Files or Directories Accessible to External Parties c

Use of Platform-Dependent Third Party Componentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1103

has super-classes
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior c

Use of Pointer Subtraction to Determine Sizec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-469

has super-classes
Incorrect Calculation c

Use of Potentially Dangerous Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-676

has super-classes
Use of Prohibited Code c
has sub-classes
Use of Path Manipulation Function without Maximum-sized Buffer c

Use of Predictable Algorithm in Random Number Generatorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1241

has super-classes
Use of Insufficiently Random Values c

Use of Prohibited Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1177

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Use of Inherently Dangerous Function c, Use of Potentially Dangerous Function c

Use of Redundant Codec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1041

has super-classes
Improper Adherence to Coding Standards c

Use of RSA Algorithm without OAEPc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-780

has super-classes
Use of a Broken or Risky Cryptographic Algorithm c

Use of Same Invokable Control Element in Multiple Architectural Layersc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1092

has super-classes
Improper Adherence to Coding Standards c

Use of Same Variable for Multiple Purposesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1109

has super-classes
Inappropriate Source Code Style or Formatting c

Use of Single-factor Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-308

has super-classes
Reliance on a Single Factor in a Security Decision c, Weak Authentication c

Use of Singleton Pattern Without Synchronization in a Multithreaded Contextc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-543

has super-classes
Missing Synchronization c

Use of sizeof() on a Pointer Typec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-467

has super-classes
Incorrect Calculation of Buffer Size c

Use of umask() with chmod-style Argumentc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-560

has super-classes
Function Call With Incorrectly Specified Argument Value c

Use of Uninitialized Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-908

has super-classes
Improper Initialization c
has sub-classes
Use of Uninitialized Variable c

Use of Uninitialized Variablec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-457

has super-classes
Use of Uninitialized Resource c

Use of Unmaintained Third Party Componentsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1104

has super-classes
Reliance on Insufficiently Trustworthy Component c

Use of Weak Credentialsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1391

has super-classes
Weak Authentication c
has sub-classes
Use of Default Credentials c, Use of Hard-coded Credentials c, Weak Password Requirements c

Use of Weak Hashc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-328

has super-classes
Inadequate Encryption Strength c, Use of a Broken or Risky Cryptographic Algorithm c

Use of Web Browser Cache Containing Sensitive Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-525

has super-classes
Use of Cache Containing Sensitive Information c

Use of Web Link to Untrusted Target with window.opener Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1022

has super-classes
Incorrect Privilege Assignment c

Use of Wrong Operator in String Comparisonc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-597

has super-classes
Comparison of Object References Instead of Object Contents c, Use of Incorrect Operator c

Userc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#User

has super-classes
Digital Artifact c
is also defined as
named individual

User Accountc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserAccount

has super-classes
Digital Artifact c
has sub-classes
Application User Account c, Cloud User Account c, Default User Account c, Domain User Account c, Local User Account c, Privileged User Account c
has members
LDIF Record ni
is also defined as
named individual

User Account Permissionsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserAccountPermissions

has super-classes
Credential Hardening c
is also defined as
named individual

User Actionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserAction

has super-classes
Digital Artifact c, Digital Event c
has sub-classes
Authentication c, Authorization c, Manual Task Run c, Resource Access c
is disjoint with
Machine Action c
is also defined as
named individual

User Activity Based Checksc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1497.002

has super-classes
Virtualization/Sandbox Evasion c

User Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserApplication

has super-classes
Application c
has sub-classes
Application Installer c, Browser c, Browser Extension c, Collaborative Software c, Developer Application c, Office Application c

User Behaviorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserBehavior

has super-classes
Digital Artifact c
is also defined as
named individual

User Behavior Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserBehaviorAnalysis

has super-classes
Defensive Technique c
has sub-classes
Authentication Event Thresholding c, Authorization Event Thresholding c, Credential Compromise Scope Analysis c, Domain Account Monitoring c, Job Function Access Pattern Analysis c, Local Account Monitoring c, Resource Access Pattern Analysis c, Session Duration Analysis c, User Data Transfer Analysis c, User Geolocation Logon Pattern Analysis c, Web Session Activity Analysis c
has members
Authentication Event Thresholding ni, Authorization Event Thresholding ni, Credential Compromise Scope Analysis ni, Domain Account Monitoring ni, Job Function Access Pattern Analysis ni, Local Account Monitoring ni, Resource Access Pattern Analysis ni, Session Duration Analysis ni, User Data Transfer Analysis ni, User Geolocation Logon Pattern Analysis ni, Web Session Activity Analysis ni
is also defined as
named individual

User Data Transfer Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserDataTransferAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

User Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1204

has super-classes
Execution Technique c
has sub-classes
Malicious File Execution c, Malicious Image c, Malicious Link Execution c

User Geolocation Logon Pattern Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserGeolocationLogonPatternAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

User Groupc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserGroup

has super-classes
Access Control Group c
is also defined as
named individual

User Init Configuration Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserInitConfigurationFile

has super-classes
Configuration File c, User Logon Init Resource c
is also defined as
named individual

User Init Scriptc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserInitScript

has super-classes
Executable Script c, Init Script c, User Logon Init Resource c
has sub-classes
PowerShell Profile Script c
is also defined as
named individual

User Input Functionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserInputFunction

has super-classes
Input Function c
is also defined as
named individual

User Interactionc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/CVSS-UserInteraction

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. This metric determines whether the vulnerability can be exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must participate in some manner. The Base Score is greatest when no user interaction is required.
is equivalent to
{ None , Required }
has super-classes
CVSS Metric c
has members
None ni, Required ni
is disjoint with
Attack Complexity c, Attack Vector c, Availability Impact c, Confidentiality Impact c, Exploit Code Maturity c, Integrity Impact c, Privileges Required c, Remediation Level c, Report Confidence c, Scope c, Security Requirement c, Severity Type c

User Interfacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserInterface

Is defined by
http://dbpedia.org/resource/User_interface
has super-classes
Digital Artifact c
has sub-classes
Command Line Interface c, Graphical User Interface c

User Interface (UI) Misrepresentation of Critical Informationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-451

has super-classes
Incorrect Provision of Specified Functionality c, Information Loss or Omission c
has sub-classes
Improper Restriction of Rendered UI Layers or Frames c, Insufficient Visual Distinction of Homoglyphs Presented to User c

User Logon Init Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserLogonInitResource

has super-classes
Local Resource c
has sub-classes
User Init Configuration File c, User Init Script c, User Startup Directory c, User Startup Script File c
is also defined as
named individual

User Manualc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserManual

has super-classes
Document c
is also defined as
named individual

User Manual Referencec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserManualReference

has super-classes
Technique Reference c
has members
Reference - /DYNAMICBASE (Use address space layout randomization) - Microsoft Docs ni, Reference - /GS (Buffer Security Check) - Microsoft Docs ni, Reference - /SAFESEH (Image has Safe Exception Handlers) - Microsoft Docs ni, Reference - Cisco ASR 9000 Series Aggregation Services Routers - Access List Commands ni, Reference - File Integrity Monitoring in Microsoft Defender for Cloud - Microsoft ni, Reference - File and Folder Permissions ni, Reference - Libre NMS - Network Map Extension ni, Reference - Libre NMS - Oxidized Extension ni, Reference - Mitigate threats by using Windows 10 security features: Data Execution Prevention - Microsoft ni, Reference - Qualys Network Passive Sensor Getting Started Guide ni, Reference - Registry Key Security and Access Rights ni, Reference - Reverse DNS Blocking - Barracuda Networks ni, Reference - SNMP - Network Auto-Discovery ni, Reference - Tivoli Application Dependency Discovery Manager 7.3.0 - Dependencies between resources ni, Reference - Tripwire ni, Reference - Use DNS Policy for Applying Filters on DNS Queries ni

User Processc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserProcess

has super-classes
Process c
has sub-classes
Application Process c
is also defined as
named individual

User Session Init Config Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserSessionInitConfigAnalysis

has super-classes
Operating System Monitoring c
is also defined as
named individual

User Startup Directoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserStartupDirectory

has super-classes
User Logon Init Resource c
is also defined as
named individual

User Startup Script Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserStartupScriptFile

has super-classes
Executable Script c, User Logon Init Resource c
is also defined as
named individual

User to User Messagec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UserToUserMessage

has super-classes
Digital Artifact c
is also defined as
named individual

Usernamec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Username

has super-classes
Observable c

Using Referer Field for Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-293

has super-classes
Authentication Bypass by Spoofing c

Utility Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#UtilitySoftware

Is defined by
http://dbpedia.org/resource/Utility_software
has super-classes
Software c
has sub-classes
System Time Application c

Valid Accountsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1078

has super-classes
Defense Evasion Technique c, Initial Access Technique c, Persistence Technique c, Privilege Escalation Technique c
has sub-classes
Cloud Accounts c, Default Accounts c, Domain Accounts c, Local Accounts c
is also defined as
named individual

Variabilityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Variability

has super-classes
Descriptive Statistics c
has sub-classes
Average Absolute Deviation c, Coefficient of Variation c, Interquartile Range c, Range c, Standard Deviation c, Variance c
is also defined as
named individual

Variable Extraction Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-621

has super-classes
Improper Control of Dynamically-Identified Variables c

Variancec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Variance

has super-classes
Variability c
is disjoint with
Coefficient of Variation c, Interquartile Range c, Mean Absolute Deviation c, Median Absolute Deviation c, Range c, Standard Deviation c
is also defined as
named individual

Variance Reductionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VarianceReduction

has super-classes
Active Learning c
is also defined as
named individual

VBA Stompingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1564.007

has super-classes
Hide Artifacts c
is also defined as
named individual

VBScript Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.005

has super-classes
Command and Scripting Interpreter Execution c

VDSO Hijackingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1055.014

has super-classes
Process Injection c
is also defined as
named individual

Vendorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Vendor

has super-classes
Provider c

Verclsidc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1218.012

has super-classes
Signed Binary Proxy Execution c

verdictc back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Verdict

A summary of an assessment for an observable or an IoC.
has super-classes
Mekanoid Thing c, Proposition c

Version Control Toolc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VersionControlTool

Is defined by
http://dbpedia.org/resource/Version_control
has super-classes
Developer Application c

Video Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1125

has super-classes
Collection Technique c
is also defined as
named individual

Video Input Devicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VideoInputDevice

has super-classes
Input Device c
has sub-classes
Image Scanner Input Device c
is also defined as
named individual

Violation of Secure Design Principlesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-657

has super-classes
Improper Adherence to Coding Standards c
has sub-classes
Dependency on Vulnerable Third-Party Component c, Execution with Unnecessary Privileges c, Improper Isolation or Compartmentalization c, Insufficient Psychological Acceptability c, Lack of Administrator Control over Security c, Not Failing Securely ('Failing Open') c, Not Using Complete Mediation c, Reliance on Security Through Obscurity c, Reliance on a Single Factor in a Security Decision c, System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers c, Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism') c

Virtual Addressc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VirtualAddress

has super-classes
Memory Address c
is also defined as
named individual

Virtual Memory Spacec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VirtualMemorySpace

Is defined by
https://whatis.techtarget.com/definition/memory
has super-classes
Memory Address Space c

Virtual Private Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.003

has super-classes
Acquire Infrastructure c

Virtual Private Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.003

has super-classes
Compromise Infrastructure c

Virtualization Softwarec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VirtualizationSoftware

has super-classes
Service Application c
is also defined as
named individual

Virtualization/Sandbox Evasionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1497

has super-classes
Defense Evasion Technique c
has sub-classes
System Checks c, Time Based Evasion c, User Activity Based Checks c

VNCc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.005

has super-classes
Remote Services c

Volumec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Volume

has super-classes
Digital Artifact c
is also defined as
named individual

Volume Boot Recordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VolumeBootRecord

has super-classes
Boot Record c
is also defined as
named individual

Votingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Voting

has super-classes
Ensemble Learning c
is also defined as
named individual

VPN Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#VPNServer

Is defined by
https://www.techopedia.com/definition/30750/vpn-server
has super-classes
Server c

Vulnerabilitiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1588.006

has super-classes
Obtain Capabilities c

vulnerabilityc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Vulnerability

has super-classes
D3FEND Thing c
has sub-classes
Critical Severity Vulnerability c, High Severity Vulnerability c, Low Severity Vulnerability c, Medium Severity Vulnerability c
is in domain of
base score dp, exploitability score dp, has CVSS metric op, impact score dp, vector dp
has members
c v e 2020 0041 ni
is also defined as
named individual

Vulnerability Scanningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1595.002

has super-classes
Active Scanning c

Weak Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-1390

has super-classes
Improper Authentication c
has sub-classes
Authentication Bypass by Alternate Name c, Authentication Bypass by Assumed-Immutable Data c, Authentication Bypass by Capture-replay c, Authentication Bypass by Primary Weakness c, Authentication Bypass by Spoofing c, Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created c, Guessable CAPTCHA c, Improper Restriction of Excessive Authentication Attempts c, Incorrect Implementation of Authentication Algorithm c, Insufficiently Protected Credentials c, Not Using Password Aging c, Password Aging with Long Expiration c, Reflection Attack in an Authentication Protocol c, Unverified Password Change c, Use of Client-Side Authentication c, Use of Password Hash Instead of Password for Authentication c, Use of Password System for Primary Authentication c, Use of Single-factor Authentication c, Use of Weak Credentials c, Weak Password Recovery Mechanism for Forgotten Password c

Weak Encoding for Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-261

has super-classes
Insufficiently Protected Credentials c

Weak Password Recovery Mechanism for Forgotten Passwordc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-640

has super-classes
Weak Authentication c

Weak Password Requirementsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-521

has super-classes
Use of Weak Credentials c
has sub-classes
Empty Password in Configuration File c

Weaken Encryptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1600

has super-classes
Defense Evasion Technique c
has sub-classes
Disable Crypto Hardware c, Reduce Key Space c

Weaknessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#Weakness

has super-classes
D3FEND Thing c
has sub-classes
Improper Access Control c, Improper Adherence to Coding Standards c, Improper Check or Handling of Exceptional Conditions c, Improper Control of a Resource Through its Lifetime c, Improper Interaction Between Multiple Correctly-Behaving Entities c, Improper Neutralization c, Incorrect Calculation c, Incorrect Comparison c, Insufficient Control Flow Management c, Protection Mechanism Failure c
is in domain of
may-be-weakness-of op
is in range of
may-have-weakness op

Web API Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebAPIResource

has super-classes
Web Resource c

Web Application Firewallc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebApplicationFirewall

Is defined by
http://dbpedia.org/resource/Web_application_firewall
has super-classes
Application Layer Firewall c

Web Application Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebApplicationServer

Is defined by
http://dbpedia.org/resource/Application_server
has super-classes
Web Server c

Web Authenticationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebAuthentication

has super-classes
Authentication c
has sub-classes
Cloud Service Authentication c
is also defined as
named individual

Web Cookiesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1606.001

has super-classes
Forge Web Credentials c

Web File Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebFileResource

has super-classes
Network File Resource c, Web Resource c
is also defined as
named individual

Web Network Trafficc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebNetworkTraffic

has super-classes
Network Traffic c
has sub-classes
Intranet Web Network Traffic c, Outbound Internet Web Traffic c
is also defined as
named individual

Web Portal Capturec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1056.003

has super-classes
Input Capture c
is also defined as
named individual

Web Protocolsc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1071.001

has super-classes
Application Layer Protocol c
is also defined as
named individual

Web Resourcec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebResource

has super-classes
Network Resource c
has sub-classes
Web API Resource c, Web File Resource c

Web Resource Accessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebResourceAccess

has super-classes
Network Resource Access c
is also defined as
named individual

Web Script Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebScriptFile

has super-classes
Executable Script c
is also defined as
named individual

Web Serverc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebServer

has super-classes
Server c
has sub-classes
Artifact Server c, Web Application Server c
is also defined as
named individual

Web Server Applicationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebServerApplication

has super-classes
Service Application c
has members
HTTP server application ni
is also defined as
named individual

Web Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1102

has super-classes
Command and Control Technique c
has sub-classes
Bidirectional Communication c, Dead Drop Resolver c, One-Way Communication c
is also defined as
named individual

Web Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1583.006

has super-classes
Acquire Infrastructure c

Web Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1584.006

has super-classes
Compromise Infrastructure c

Web Session Activity Analysisc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WebSessionActivityAnalysis

has super-classes
User Behavior Analysis c
is also defined as
named individual

Web Session Cookiec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1506

has super-classes
Defense Evasion Technique c, Lateral Movement Technique c

Web Session Cookiec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1550.004

has super-classes
Use Alternate Authentication Material c
is also defined as
named individual

Web Shellc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1100

has super-classes
Persistence Technique c, Privilege Escalation Technique c

Web Shellc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1505.003

has super-classes
Server Software Component c
is also defined as
named individual

Weighted Meanc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WeightedMean

has super-classes
Central Tendency c
is disjoint with
Geometric Mean c, Harmonic Mean c, Mean c, Median c, Mode c, Trimmed Mean c
is also defined as
named individual

WHOISc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1596.002

has super-classes
Search Open Technical Databases c

Wide Area Networkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WideAreaNetwork

Is defined by
http://dbpedia.org/resource/Local_area_network
has super-classes
Network c

Windows Admin Sharesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1077

has super-classes
Lateral Movement Technique c

Windows Command Shell Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1059.003

has super-classes
Command and Scripting Interpreter Execution c

Windows Credential Managerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1555.004

has super-classes
Credentials from Password Stores c

Windows File and Directory Permissions Modificationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1222.001

has super-classes
File and Directory Permissions Modification c

Windows Hard Linkc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-65

has super-classes
Improper Link Resolution Before File Access ('Link Following') c

Windows Management Instrumentation Event Subscriptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1084

has super-classes
Persistence Technique c

Windows Management Instrumentation Event Subscriptionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1546.003

has super-classes
Event Triggered Execution c
is also defined as
named individual

Windows Management Instrumentation Executionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1047

has super-classes
Execution Technique c
is also defined as
named individual

Windows NtAllocateVirtualMemoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtAllocateVirtualMemory

has super-classes
OS API Allocate Memory c, OS API Private Function c

Windows NtAllocateVirtualMemoryExc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtAllocateVirtualMemoryEx

has super-classes
OS API Allocate Memory c, OS API Private Function c

Windows NtCreateFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateFile

has super-classes
OS API Create File c, OS API Private Function c

Windows NtCreateMailslotFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateMailslotFile

has super-classes
OS API Create File c, OS API Private Function c

Windows NtCreateNamedPipeFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateNamedPipeFile

has super-classes
OS API Create File c, OS API Private Function c

Windows NtCreatePagingFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreatePagingFile

has super-classes
OS API Create File c, OS API Private Function c

Windows NtCreateProcessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateProcess

has super-classes
OS API Create Process c, OS API Private Function c

Windows NtCreateProcessExc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateProcessEx

has super-classes
OS API Create Process c, OS API Private Function c

Windows NtCreateThreadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateThread

has super-classes
OS API Create Thread c, OS API Private Function c

Windows NtCreateThreadExc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtCreateThreadEx

has super-classes
OS API Create Thread c, OS API Private Function c

Windows NtDeleteFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtDeleteFile

has super-classes
OS API Delete File c, OS API Private Function c

Windows NtDuplicateTokenc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtDuplicateToken

has super-classes
OS API Copy Token c, OS API Private Function c

Windows NtFreeVirtualMemoryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtFreeVirtualMemory

has super-classes
OS API Free Memory c, OS API Private Function c

Windows NtOpenFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtOpenFile

has super-classes
OS API Open File c, OS API Private Function c

Windows NtOpenProcessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtOpenProcess

has super-classes
OS API Private Function c, OS API Trace Process c

Windows NtQuerySystemTimec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtQuerySystemTime

has super-classes
OS API Get System Time c, OS API Private Function c

Windows NtReadFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtReadFile

has super-classes
OS API Private Function c, OS API Read File c

Windows NtReadFileScatterc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtReadFileScatter

has super-classes
OS API Private Function c, OS API Read File c

Windows NtSetInformationFile Argument FileDispositionInformationc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtSetInformationFileArgumentFileDispositionInformation

has super-classes
OS API Delete File c, OS API Private Function c

Windows NtSuspendProcessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtSuspendProcess

has super-classes
OS API Private Function c, OS API Suspend Process c

Windows NtSuspendThreadc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtSuspendThread

has super-classes
OS API Private Function c, OS API Suspend Thread c

Windows NtTerminateProcessc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtTerminateProcess

has super-classes
OS API Private Function c, OS API Terminate Process c

Windows NtWriteFilec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtWriteFile

has super-classes
OS API Private Function c, OS API Write File c

Windows NtWriteFileGatherc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsNtWriteFileGather

has super-classes
OS API Private Function c, OS API Write File c

Windows Registryc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsRegistry

has super-classes
System Configuration Database c
is also defined as
named individual

Windows Registry Keyc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsRegistryKey

has super-classes
System Configuration Database Record c
is also defined as
named individual

Windows Registry Valuec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsRegistryValue

has super-classes
System Configuration Database Record c
is also defined as
named individual

Windows Remote Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1021.006

has super-classes
Remote Services c

Windows Remote Managementc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1028

has super-classes
Execution Technique c, Lateral Movement Technique c

Windows Servicec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1543.003

has super-classes
Create or Modify System Process c
is also defined as
named individual

Windows Shortcut Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WindowsShortcutFile

has super-classes
Shortcut File c
is also defined as
named individual

Windows Shortcut Following (.LNK)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-64

has super-classes
Improper Link Resolution Before File Access ('Link Following') c

Winlogon Helper DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1004

has super-classes
Persistence Technique c

Winlogon Helper DLLc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.004

has super-classes
Boot or Logon Autostart Execution c
is also defined as
named individual

Wireless Access Pointc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WirelessAccessPoint

Is defined by
http://dbpedia.org/resource/Wireless_access_point
has super-classes
Network Node c, RF Transceiver c
has sub-classes
Wireless Router c

Wireless Routerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WirelessRouter

Is defined by
http://dbpedia.org/resource/Wireless_router
has super-classes
Router c, Wireless Access Point c

Wordlist Scanningc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1595.003

has super-classes
Active Scanning c

Wrap-around Errorc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-128

has super-classes
Incorrect Calculation c

Write Filec back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#WriteFile

has super-classes
System Call c
is also defined as
named individual

Write-what-where Conditionc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-123

has super-classes
Out-of-bounds Write c

XDG Autostart Entriesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1547.013

has super-classes
Boot or Logon Autostart Execution c

XML Injection (aka Blind XPath Injection)c back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#CWE-91

has super-classes
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') c
has sub-classes
Improper Neutralization of Data within XPath Expressions ('XPath Injection') c, Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') c

XPC Servicesc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1559.003

has super-classes
Inter-Process Communication Execution c

XSL Script Processingc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#T1220

has super-classes
Defense Evasion Technique c
is also defined as
named individual

YARA Rulec back to ToC or Class ToC

IRI: https://mekanoid.io/ontology/Yara

has super-classes
Detection Rule c

Zero Client Computerc back to ToC or Class ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#ZeroClientComputer

Is defined by
http://dbpedia.org/resource/Thin_client#Zero_client
has super-classes
Thin Client Computer c

Object Properties

abusesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#abuses

Is defined by
http://wordnet-rdf.princeton.edu/id/01163606-v
has super-properties
uses op

accessed byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#accessed-by

has super-properties
associated-with op, may-be-accessed-by op
is inverse of
accesses op

accessesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#accesses

Is defined by
http://wordnet-rdf.princeton.edu/id/02673854-n
has super-properties
associated-with op, may-access op
has sub-properties
executes op, modifies op, reads op, writes op
has range
Network Resource c
is inverse of
accessed by op

addressed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#addressed-by

has super-properties
associated-with op
has domain
Resource c
has range
Identifier c
is inverse of
addresses op

addressesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#addresses

has super-properties
associated-with op
has domain
Identifier c
has range
Resource c
is inverse of
addressed-by op

addsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#adds

has super-properties
associated-with op, may-add op

analyzed byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#analyzed-by

has super-properties
d3fend-catalog-object-property op
is inverse of
analyzes op

analyzesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#analyzes

Is defined by
http://wordnet-rdf.princeton.edu/id/00738221-v
has super-properties
associated-with op, detects op
has sub-properties
verifies op
is inverse of
analyzed by op

assessed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#assessed-by

has super-properties
d3fend-catalog-object-property op
is inverse of
assesses op

assessesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#assesses

has super-properties
d3fend-catalog-object-property op
has domain
Defensive Technique Claim c
has range
Defensive Technique Assessment c
is inverse of
assessed-by op

associated-withop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#associated-with

attached-toop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#attached-to

Is defined by
http://wordnet-rdf.princeton.edu/id/01980375-s
has super-properties
associated-with op

attack complexityop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/attackComplexity

has characteristics: functional

has super-properties
has CVSS metric op
has range
Attack Complexity c

attack vectorop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/attackVector

has characteristics: functional

has super-properties
has CVSS metric op
has range
Attack Vector c

attack-may-be-countered-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#attack-may-be-countered-by

authenticatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#authenticates

Is defined by
http://wordnet-rdf.princeton.edu/id/01980375-s
has super-properties
associated-with op, hardens op

authorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#author

has super-properties
creator op

authorizesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#authorizes

Is defined by
http://wordnet-rdf.princeton.edu/id/00804987-v
has super-properties
associated-with op, hardens op

availability impactop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/availabilityImpact

has characteristics: functional

has super-properties
has CVSS metric op
has range
Availability Impact c

blocksop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#blocks

Is defined by
http://wordnet-rdf.princeton.edu/id/01480024-v
has super-properties
counters op, filters op

broaderop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#broader

has super-properties
semantic-relation op

broader-transitiveop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#broader-transitive

has super-properties
semantic-relation op

cited-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#cited-by

has super-properties
d3fend-catalog-object-property op
is inverse of
cites op

citesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#cites

claimed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#claimed-by

has super-properties
d3fend-catalog-object-property op
is inverse of
claims op

claimsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#claims

has super-properties
d3fend-catalog-object-property op
has sub-properties
features op
is inverse of
claimed-by op

confidentiality impactop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/confidentialityImpact

has characteristics: functional

has super-properties
has CVSS metric op

configuresop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#configures

has super-properties
associated-with op, hardens op

connected byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#connected-by

has super-properties
d3fend-catalog-object-property op
is inverse of
connects op

connectsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#connects

Is defined by
http://wordnet-rdf.princeton.edu/id/01071413-v
has super-properties
associated-with op
is inverse of
connected by op

contained-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#contained-by

has characteristics: transitive

has super-properties
associated-with op, may-be-contained-by op
is inverse of
contains op

containsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#contains

Is defined by
http://wordnet-rdf.princeton.edu/id/02639021-v

has characteristics: transitive

has super-properties
associated-with op, may-contain op
is inverse of
contained-by op

contributorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#contributor

has super-properties
d3fend-catalog-object-property op
has sub-properties
creator op, evaluator op, submitter op, validator op
has range
thing c

copiesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#copies

Is defined by
http://wordnet-rdf.princeton.edu/id/01738810-v
has super-properties
creates op

copy-ofop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#copy-of

has super-properties
associated-with op

countersop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#counters

has super-properties
d3fend-catalog-object-property op, may-counter op
has sub-properties
blocks op, deceives op, detects op, evicts op, hardens op

created-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#created-by

has super-properties
associated-with op, may-be-created-by op
is inverse of
creates op

createsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#creates

Is defined by
http://wordnet-rdf.princeton.edu/id/01630392-v
has super-properties
associated-with op, may-create op
has sub-properties
copies op, forges op
is inverse of
created-by op

creatorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#creator

has super-properties
contributor op
has sub-properties
author op

d3fend object propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-object-property

d3fend use case object propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-use-case-object-property

has super-properties
d3fend object property op
has sub-properties
has audience op, has goal op, has prerequisite op

d3fend-catalog-object-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-catalog-object-property

has super-properties
d3fend object property op
has sub-properties
analyzed by op, assessed-by op, assesses op, cited-by op, cites op, claimed-by op, claims op, connected by op, contributor op, counters op, has-evidence op, has-feature op, has-implementation op, has-member op, implemented-by op, implements op, isolated by op, latency op, license op, member-of op, producer op, produces op, provided by op, provides op, publisher op, publishes op, seller op, sells op
is inverse of
cites op

d3fend-general-object-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-general-object-property

has super-properties
d3fend object property op
has sub-properties
has-procedure op

d3fend-kb-object-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-kb-object-property

has super-properties
d3fend object property op
has sub-properties
has-contribution op, has-contributor op, kb-reference op, kb-reference-of op

d3fend-process-object-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-process-object-property

has super-properties
d3fend object property op
has sub-properties
end op, fork op, next op, resume op, start op

d3fend-tactical-verb-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-tactical-verb-property

has super-properties
d3fend object property op
has sub-properties
deceives-with op, detects op, evicts op, hardens op, isolates op
has domain
Defensive Technique c
has range
Artifact c

deceivesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#deceives

has super-properties
counters op

deceives-withop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#deceives-with

has super-properties
d3fend-tactical-verb-property op
has sub-properties
spoofs op

deletesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#deletes

Is defined by
http://wordnet-rdf.princeton.edu/id/01001860-v
has super-properties
evicts op, modifies op

dependentop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#dependent

Is defined by
http://wordnet-rdf.princeton.edu/id/00729216-a
has super-properties
associated-with op

depends-onop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#dependsOn

Is defined by
http://wordnet-rdf.princeton.edu/id/00729216-a
x depends-on y: The entity x is contingent on y being available; x relies on y.
has super-properties
associated-with op
is inverse of
has-dependent op

detectsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#detects

has super-properties
counters op, d3fend-tactical-verb-property op
has sub-properties
analyzes op, monitors op

disablesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#disables

Is defined by
http://wordnet-rdf.princeton.edu/id/00513267-v
has super-properties
evicts op, may-disable op, modifies op

drivesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#drives

Is defined by
http://wordnet-rdf.princeton.edu/id/01184038-v
has super-properties
associated-with op

employed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#employed-by

Is defined by
http://wordnet-rdf.princeton.edu/id/01161188-v
has super-properties
associated-with op
is inverse of
employs op

employsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#employs

has super-properties
associated-with op
is inverse of
employed-by op

enabled-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#enabled-by

Is defined by
http://wordnet-rdf.princeton.edu/id/00513958-v
has super-properties
associated-with op
is inverse of
enables op

enablesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#enables

Is defined by
http://wordnet-rdf.princeton.edu/id/00513958-v
has super-properties
associated-with op
is inverse of
enabled-by op

encryptsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#encrypts

Is defined by
http://wordnet-rdf.princeton.edu/id/00996121-v
has super-properties
associated-with op, hardens op

endop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#end

has super-properties
d3fend-process-object-property op

enumeratesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#enumerates

has super-properties
reads op

evaluated-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#evaluated-by

has super-properties
associated-with op
is inverse of
evaluates op

evaluatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#evaluates

has super-properties
associated-with op, may-evaluate op
is inverse of
evaluated-by op

evaluatorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#evaluator

has super-properties
contributor op

evictsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#evicts

has super-properties
counters op, d3fend-tactical-verb-property op, may-evict op
has sub-properties
deletes op, disables op, obfuscates op, suspends op, terminates op

exactlyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#exactly

has super-properties
semantic-relation op

executed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#executed-by

has super-properties
associated-with op
is inverse of
executes op

executesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#executes

Is defined by
http://wordnet-rdf.princeton.edu/id/02569242-v
has super-properties
accesses op, may-execute op, runs op
has sub-properties
injects op, interprets op, invokes op
is inverse of
executed-by op

expected-latencyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#expected-latency

has super-properties
latency op
has range
latency op some Latency c

exploit code maturityop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/exploitCodeMaturity

has characteristics: functional

has super-properties
has CVSS metric op
has range
Exploit Code Maturity c

extendsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#extends

Is defined by
http://wordnet-rdf.princeton.edu/id/00541315-v
has super-properties
modifies op

featuresop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#features

has super-properties
claims op
has domain
Capability Feature Claim c
has range
Capability Feature c

filtersop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#filters

Is defined by
http://wordnet-rdf.princeton.edu/id/01461293-v
has super-properties
associated-with op, isolates op
has sub-properties
blocks op

forgesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#forges

has super-properties
creates op

forkop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#fork

has super-properties
d3fend-process-object-property op

hardensop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#hardens

has super-properties
counters op, d3fend-tactical-verb-property op
has sub-properties
authenticates op, authorizes op, configures op, encrypts op, neutralizes op, regenerates op, strengthens op, updates op, validates op

has audienceop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-audience

has super-properties
d3fend use case object property op

has CVSS metricop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/hasCVSSMetric

has goalop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-goal

has super-properties
d3fend use case object property op
has range
Use Case Goal c

has prerequisiteop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-prerequisite

has super-properties
d3fend use case object property op

has referenceop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/reference

has super-properties
top object property
has sub-properties
has URL op
is also defined as
data property

has URLop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/hasURL

has super-properties
has reference op
has sub-properties
S3 bucket URL op
has domain
File c
Analysis Report c
is also defined as
data property

has-accountop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-account

has super-properties
owns op

has-contributionop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-contribution

has super-properties
d3fend-kb-object-property op

has-contributorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-contributor

has super-properties
d3fend-kb-object-property op

has-dependentop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-dependent

has super-properties
associated-with op
is inverse of
depends-on op

has-evidenceop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-evidence

has super-properties
d3fend-catalog-object-property op

has-featureop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-feature

has super-properties
d3fend-catalog-object-property op

has-implementationop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-implementation

has super-properties
d3fend-catalog-object-property op

has-locationop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-location

Is defined by
http://wordnet-rdf.princeton.edu/id/02133811-s
has super-properties
associated-with op

has-memberop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-member

has super-properties
d3fend-catalog-object-property op
is inverse of
member-of op

has-procedureop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-procedure

has super-properties
d3fend-general-object-property op

has-recipientop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-recipient

Is defined by
http://www.ontologyrepository.com/CommonCoreOntologies/has_recipient
has super-properties
associated-with op

has-senderop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-sender

Is defined by
http://www.ontologyrepository.com/CommonCoreOntologies/has_sender
has super-properties
associated-with op

has-weaknessop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#has-weakness

has super-properties
may-have-weakness op
is inverse of
weakness-of op

hidesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#hides

has super-properties
associated-with op
has range
Digital Artifact c

identified-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#identified-by

has super-properties
associated-with op
is inverse of
identified-by op, identified-by op, identifies op

identifiesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#identifies

has super-properties
associated-with op
is inverse of
identified-by op

impairsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#impairs

has super-properties
associated-with op

implemented-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#implemented-by

has super-properties
d3fend-catalog-object-property op
has range
Capability Implementation c
is inverse of
implements op

implementsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#implements

has super-properties
d3fend-catalog-object-property op
has domain
Capability Implementation c
is inverse of
implemented-by op
is also defined as
annotation property

indicated byop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/indicatedBy

has super-properties
may be indicated by op
is inverse of
indicates op

indicatesop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/indicates

has super-properties
may indicate op
is inverse of
indicated by op

injectsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#injects

has super-properties
executes op

installsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#installs

Is defined by
http://wordnet-rdf.princeton.edu/id/01572394-v
has super-properties
associated-with op

instructed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#instructed-by

has super-properties
associated-with op

instructsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#instructs

has super-properties
associated-with op

integrity impactop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/integrityImpact

has characteristics: functional

has super-properties
has CVSS metric op

interpretsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#interprets

has super-properties
executes op, may-interpret op

inventoried-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#inventoried-by

has super-properties
associated-with op
is inverse of
inventories op

inventoriesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#inventories

has super-properties
associated-with op
is inverse of
inventoried-by op

invoked-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#invoked-by

has super-properties
associated-with op, may-be-invoked-by op
is inverse of
invokes op

invokesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#invokes

Is defined by
http://wordnet-rdf.princeton.edu/id/06599393-n
has super-properties
executes op, may-invoke op
is inverse of
invoked-by op

isolated byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#isolated-by

has super-properties
d3fend-catalog-object-property op

isolatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#isolates

Is defined by
http://wordnet-rdf.princeton.edu/id/00496744-v
has super-properties
associated-with op, d3fend-tactical-verb-property op
has sub-properties
filters op

kb-referenceop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#kb-reference

has super-properties
d3fend-kb-object-property op
is inverse of
kb-reference-of op

kb-reference-ofop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#kb-reference-of

has super-properties
d3fend-kb-object-property op
has domain
Reference c
has range
Technique c
is inverse of
kb-reference op

latencyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#latency

has super-properties
d3fend-catalog-object-property op
has sub-properties
expected-latency op
has range
latency op some Latency c

licenseop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#license

has super-properties
d3fend-catalog-object-property op
has range
license op some License c

limitsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#limits

Is defined by
http://wordnet-rdf.princeton.edu/id/13781154-n
has super-properties
restricts op
has sub-properties
use-limits op

loaded-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#loaded-by

has super-properties
associated-with op
is inverse of
loads op

loadsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#loads

Is defined by
http://wordnet-rdf.princeton.edu/id/02236692-v
has super-properties
associated-with op
is inverse of
loaded-by op

managesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#manages

Is defined by
http://wordnet-rdf.princeton.edu/id/02447914-v
has super-properties
associated-with op

mapped-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#mapped-by

has super-properties
associated-with op
is inverse of
maps op

mapsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#maps

has super-properties
may-map op
is inverse of
mapped-by op

may be indicated byop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/mayBeIndicatedBy

has sub-properties
indicated by op
is inverse of
may indicate op

may indicateop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/mayIndicate

has sub-properties
indicates op
is inverse of
may be indicated by op

may-accessop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-access

has super-properties
may-be-associated-with op
has sub-properties
accesses op
is inverse of
may-be-accessed-by op

may-addop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-add

has super-properties
may-be-associated-with op
has sub-properties
adds op

may-be-accessed-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-accessed-by

has super-properties
may-be-associated-with op
has sub-properties
accessed by op
is inverse of
may-access op

may-be-associated-withop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-associated-with

may-be-contained-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-contained-by

has characteristics: transitive

has super-properties
may-be-associated-with op
has sub-properties
contained-by op
is inverse of
may-contain op

may-be-created-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-created-by

has super-properties
may-be-associated-with op
has sub-properties
created-by op
is inverse of
may-create op

may-be-deceived-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-deceived-by

has super-properties
attack-may-be-countered-by op
is inverse of
may-deceive op

may-be-detected-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-detected-by

has super-properties
attack-may-be-countered-by op
is inverse of
may-detect op

may-be-evicted-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-evicted-by

has super-properties
attack-may-be-countered-by op
is inverse of
may-evict op

may-be-hardened-against-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-hardened-against-by

has super-properties
attack-may-be-countered-by op
is inverse of
may-harden op

may-be-invoked-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-invoked-by

has super-properties
may-be-associated-with op
has sub-properties
invoked-by op
is inverse of
may-invoke op

may-be-isolated-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-isolated-by

has super-properties
attack-may-be-countered-by op
is inverse of
may-isolate op

may-be-modified-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-modified-by

has super-properties
may-be-associated-with op
has sub-properties
modified-by op
is inverse of
may-modify op

may-be-tactically-associated-withop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-tactically-associated-with

has super-properties
may-be-associated-with op
has sub-properties
attack-may-be-countered-by op, may-counter-attack op
has domain
Defensive Technique c
has range
Offensive Technique c

may-be-weakness-ofop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-be-weakness-of

has super-properties
may-be-associated-with op
has sub-properties
weakness-of op
has domain
Weakness c
has range
Artifact c
is inverse of
may-have-weakness op

may-containop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-contain

has characteristics: transitive

has super-properties
may-be-associated-with op
has sub-properties
contains op
is inverse of
may-be-contained-by op

may-counterop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-counter

has super-properties
may-be-associated-with op
has sub-properties
counters op, may-evict op

may-counter-attackop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-counter-attack

has super-properties
may-be-tactically-associated-with op
has sub-properties
may-deceive op, may-detect op, may-evict op, may-harden op, may-isolate op

may-createop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-create

has super-properties
may-be-associated-with op
has sub-properties
creates op
is inverse of
may-be-created-by op

may-deceiveop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-deceive

has super-properties
may-counter-attack op
is inverse of
may-be-deceived-by op

may-detectop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-detect

has super-properties
may-counter-attack op
is inverse of
may-be-detected-by op

may-disableop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-disable

has super-properties
may-evict op
has sub-properties
disables op

may-evaluateop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-evaluate

has super-properties
may-be-associated-with op
has sub-properties
evaluates op

may-evictop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-evict

has super-properties
may-counter op, may-counter-attack op
has sub-properties
evicts op, may-disable op
is inverse of
may-be-evicted-by op

may-executeop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-execute

has super-properties
may-be-associated-with op
has sub-properties
executes op

may-hardenop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-harden

has super-properties
may-counter-attack op
is inverse of
may-be-hardened-against-by op

may-have-weaknessop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-have-weakness

has super-properties
may-be-associated-with op
has sub-properties
has-weakness op
has domain
Artifact c
has range
Weakness c
is inverse of
may-be-weakness-of op

may-interpretop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-interpret

has super-properties
may-be-associated-with op
has sub-properties
interprets op

may-invokeop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-invoke

has super-properties
may-be-associated-with op
has sub-properties
invokes op
is inverse of
may-be-invoked-by op

may-isolateop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-isolate

has super-properties
may-counter-attack op
is inverse of
may-be-isolated-by op

may-mapop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-map

has super-properties
may-be-associated-with op
has sub-properties
maps op

may-modifyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-modify

has super-properties
may-be-associated-with op
has sub-properties
modifies op, modifies-part op
is inverse of
may-be-modified-by op

may-produceop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-produce

has super-properties
may-be-associated-with op
has sub-properties
produces op

may-queryop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-query

has super-properties
may-be-associated-with op
has sub-properties
queries op

may-runop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-run

has super-properties
may-be-associated-with op
has sub-properties
runs op

may-transferop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#may-transfer

has super-properties
may-be-associated-with op

member-ofop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#member-of

has super-properties
d3fend-catalog-object-property op
is inverse of
has-member op

mknd object propertyop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/mkndObjectProperty

has super-properties
supports op

modified-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#modified-by

has super-properties
associated-with op, may-be-modified-by op
has sub-properties
updated by op
is inverse of
modifies op

modifiesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#modifies

Is defined by
http://wordnet-rdf.princeton.edu/id/00126072-v
has super-properties
accesses op, associated-with op, may-modify op
has sub-properties
deletes op, disables op, extends op, obfuscates op, updates op
is inverse of
modified-by op

modifies-partop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#modifies-part

has super-properties
may-modify op
has sub-property chains
modifies op o contains op

monitorsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#monitors

Is defined by
http://wordnet-rdf.princeton.edu/id/02167732-v
has super-properties
associated-with op, detects op

narrowerop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#narrower

has super-properties
semantic-relation op

narrower-transitiveop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#narrower-transitive

has super-properties
semantic-relation op

neutralizesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#neutralizes

Is defined by
http://wordnet-rdf.princeton.edu/id/00471015-v
has super-properties
associated-with op, hardens op

nextop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#next

has super-properties
d3fend-process-object-property op

obfuscatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#obfuscates

Is defined by
http://wordnet-rdf.princeton.edu/id/00942245-v
has super-properties
evicts op, modifies op

originates-fromop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#originates-from

Is defined by
http://wordnet-rdf.princeton.edu/id/02749218-v
has super-properties
associated-with op

ownsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#owns

Is defined by
http://wordnet-rdf.princeton.edu/id/02209474-v
has super-properties
associated-with op
has sub-properties
has-account op

privileges requiredop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/privilegesRequired

has characteristics: functional

has super-properties
has CVSS metric op

process-ancestorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-ancestor

has characteristics: transitive

has super-properties
process-property op
has sub-properties
process-parent op

process-image-pathop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-image-path

has super-properties
process-property op

process-parentop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-parent

has super-properties
process-ancestor op

process-propertyop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-property

has super-properties
associated-with op
has sub-properties
process-ancestor op, process-image-path op, process-user op

process-userop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-user

has super-properties
process-property op

produced-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#produced-by

has super-properties
associated-with op
is inverse of
produces op

producerop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#producer

has super-properties
d3fend-catalog-object-property op
is inverse of
produces op

producesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#produces

Is defined by
http://wordnet-rdf.princeton.edu/id/01625832-v
has super-properties
associated-with op, d3fend-catalog-object-property op, may-produce op
is inverse of
produced-by op, producer op

provided byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#providedBy

has super-properties
d3fend-catalog-object-property op
is inverse of
provides op

providerop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#provider

Is defined by
http://wordnet-rdf.princeton.edu/id/05901034-n
has super-properties
associated-with op

providesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#provides

has super-properties
d3fend-catalog-object-property op
is inverse of
provided by op

publisherop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#publisher

has super-properties
d3fend-catalog-object-property op
is inverse of
publishes op
is also defined as
annotation property

publishesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#publishes

has super-properties
d3fend-catalog-object-property op
is inverse of
publisher op
is also defined as
annotation property

queriesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#queries

has super-properties
associated-with op, may-query op

readsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#reads

has super-properties
accesses op
has sub-properties
enumerates op

recorded-inop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#recorded-in

has super-properties
associated-with op
is inverse of
records op

recordsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#records

Is defined by
http://wordnet-rdf.princeton.edu/id/01002259-v
has super-properties
associated-with op
is inverse of
recorded-in op

regeneratesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#regenerates

Is defined by
http://wordnet-rdf.princeton.edu/id/00167632-v
has super-properties
associated-with op, hardens op

relatedop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#related

Is defined by
http://www.w3.org/2004/02/skos/core#related
has super-properties
semantic-relation op

remediation levelop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/remediationLevel

has characteristics: functional

has super-properties
has CVSS metric op
has range
Remediation Level c

report confidenceop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/reportConfidence

has characteristics: functional

has super-properties
has CVSS metric op
has range
Report Confidence c

restoresop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#restores

has super-properties
associated-with op

restricted-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#restricted-by

has super-properties
associated-with op
is inverse of
restricts op

restrictsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#restricts

Is defined by
http://wordnet-rdf.princeton.edu/id/00234091-v
has super-properties
associated-with op
has sub-properties
limits op
is inverse of
restricted-by op

resumeop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#resume

Is defined by
http://wordnet-rdf.princeton.edu/id/00350758-v
has super-properties
d3fend-process-object-property op

runsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#runs

has super-properties
associated-with op, may-run op
has sub-properties
executes op

S3 bucket URLop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/importBucketUrl

has characteristics: functional

has super-properties
has URL op
is also defined as
data property

scopeop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/scope

has characteristics: functional

has super-properties
has CVSS metric op

sellerop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#seller

has super-properties
d3fend-catalog-object-property op
is inverse of
sells op

sellsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#sells

has super-properties
d3fend-catalog-object-property op
is inverse of
seller op

semantic-relationop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#semantic-relation

has super-properties
associated-with op
has sub-properties
broader op, broader-transitive op, exactly op, narrower op, narrower-transitive op, related op

severityop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/severityRating

has characteristics: functional

has super-properties
has CVSS metric op
has range
Severity Type c

spoofsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#spoofs

has super-properties
associated-with op, deceives-with op

startop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#start

has super-properties
d3fend-process-object-property op

strengthensop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#strengthens

Is defined by
http://wordnet-rdf.princeton.edu/id/00165779-v
has super-properties
associated-with op, hardens op

submitterop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#submitter

has super-properties
contributor op

summarizesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#summarizes

Is defined by
http://wordnet-rdf.princeton.edu/id/02758570-v
has super-properties
associated-with op

supportsop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/supports

Example
Integration x supports product or service y.
has sub-properties
mknd object property op

suspendsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#suspends

Is defined by
http://wordnet-rdf.princeton.edu/id/00543748-v
has super-properties
evicts op

terminatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#terminates

Is defined by
http://wordnet-rdf.princeton.edu/id/00353480-v
has super-properties
associated-with op, evicts op

unmountsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#unmounts

has super-properties
associated-with op

updated byop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/updated-by

has super-properties
modified-by op
is inverse of
updates op

updatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#updates

has super-properties
hardens op, modifies op
is inverse of
updated by op

use-limitsop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#use-limits

has super-properties
limits op

used-byop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#used-by

has super-properties
associated-with op
is inverse of
uses op

user interactionop back to ToC or Object Property ToC

IRI: https://mekanoid.io/ontology/userInteraction

has characteristics: functional

has super-properties
has CVSS metric op

usesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#uses

Is defined by
http://wordnet-rdf.princeton.edu/id/01161188-v
has super-properties
associated-with op
has sub-properties
abuses op
is inverse of
used-by op

validatesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#validates

Is defined by
http://wordnet-rdf.princeton.edu/id/00669142-v
has super-properties
associated-with op, hardens op

validatorop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#validator

has super-properties
contributor op

verifiesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#verifies

Is defined by
http://wordnet-rdf.princeton.edu/id/00666401-v
has super-properties
analyzes op, associated-with op

weakness-ofop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#weakness-of

has super-properties
may-be-weakness-of op
is inverse of
has-weakness op

writesop back to ToC or Object Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#writes

has super-properties
accesses op

Data Properties

archived-atdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#archived-at

has super-properties
d3fend-catalog-data-property dp
has range
anyURI

attack-kb-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#attack-kb-data-property

has super-properties
top data property

base scoredp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/cvssBaseScore

has characteristics: functional

has super-properties
top data property
has domain
vulnerability c
has range
decimal

capec-iddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#capec-id

has super-properties
d3fend-kb-data-property dp

categorydp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extCategory

has super-properties
vendor property dp

classificationdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extClassification

An external classification that may apply to the artifact. Typically provided by a 3rd party vendor.
has super-properties
vendor property dp
has sub-properties
Priority dp, Risk dp, Severity dp, Threat Level dp, Urgency dp

commentsdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#comments

has characteristics: functional

has super-properties
d3fend-catalog-data-property dp
has domain
Capability Feature Claim c
has range
string

confidencedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#confidence

has super-properties
d3fend-catalog-data-property dp

control-namedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#control-name

has super-properties
d3fend-external-control-data-property dp

CPEdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/cpe

Example
cpe:2.3:a:apple:icloud:1.0:*:*:*:*:macos:*:*
has super-properties
identifier dp
has range
string

created atdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/timeCreated

Time when the entity had been created at the point of origin.
has super-properties
has timestamp dp

created atdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/timeCreatedEpoch

Time when the entity had been created at the point of origin.
has super-properties
has epoch dp

CVSS versiondp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/version

has characteristics: functional

has super-properties
top data property
has range
decimal

d3fend-artifact-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-artifact-data-property

has super-properties
d3fend-data-property dp
has sub-properties
process-data-property dp, windows-registry-data-property dp
has domain
Digital Artifact c

d3fend-catalog-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-catalog-data-property

has super-properties
d3fend-data-property dp, d3fend-external-control-data-property dp
has sub-properties
archived-at dp, comments dp, confidence dp, expectation rating dp, identifier dp, name dp, operating-system dp, rating dp, stage dp, text dp, title dp, version dp

d3fend-commentdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-comment

has super-properties
d3fend-kb-data-property dp

d3fend-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-data-property

d3fend-display-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-display-property

has super-properties
d3fend-data-property dp

d3fend-external-control-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-external-control-data-property

has super-properties
d3fend-data-property dp
has sub-properties
control-name dp, d3fend-catalog-data-property dp, version dp

d3fend-iddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-id

has super-properties
d3fend-kb-data-property dp

d3fend-kb-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#d3fend-kb-data-property

has super-properties
d3fend-data-property dp
has sub-properties
capec-id dp, d3fend-comment dp, d3fend-id dp, has-link dp, kb-reference-title dp

datedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#date

has super-properties
d3fend-data-property dp
has sub-properties
date available dp, date created dp, date issued dp, date modified dp, date published dp, date valid dp
has range
date time

date availabledp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#available

has super-properties
date dp
has range
date time

date createddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#created

has super-properties
date dp
has range
date time

date issueddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#issued

has super-properties
date dp
has range
date time

date modifieddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#modified

has super-properties
date dp
has range
date time

date publisheddp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#published

has super-properties
date dp
has range
date time

date validdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#valid

has super-properties
date dp
has range
date time

expectation ratingdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#expectation-rating

has super-properties
d3fend-catalog-data-property dp

exploitability scoredp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/cvssExploitabilityScore

has characteristics: functional

has super-properties
top data property
has domain
vulnerability c
has range
decimal

external IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/external-id

Mekanoid data property that represents an identifier assigned by an external system or vendor. It is applicable to entities such as hosts and user accounts, providing a unique string-based identifier that aligns with external records or systems. This property facilitates the integration and mapping of internal entities with external references, enhancing cross-system data coherence and identification.
has super-properties
identifier dp, vendor property dp

filenamedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/importFileName

has super-properties
top data property
has range
anyURI

first seendp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/firstSeen

The first time the enity had been observed by the application.
has super-properties
seen at dp

first seendp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/firstSeenEpoch

has super-properties
has epoch dp

has epochdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/dateTimeEpoch

A Unix epoch timestamp associated with the entity
A Unix epoch timestamp associated with the entity
Example
990577200

has characteristics: functional

has sub-properties
created at dp, first seen dp, last accessed dp, last modified dp, last seen dp, last status change dp
has range
long

has sizedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/size

has characteristics: functional

has domain
File c
has range
byte

has timestampdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/dateTime

A date and time associated with the entity
Example
2002-10-10T12:00:00-05:00

has characteristics: functional

has sub-properties
created at dp, modified at dp, seen at dp
has domain
Mekanoid Thing c
has range
date time stamp

has URLop back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/hasURL

has super-properties
identifier dp
has sub-properties
S3 bucket URL op
is also defined as
object property

has valuedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/value

A value parameter to be passed to Tasks
has super-properties
top data property

IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/id

Mekanoid ID
has super-properties
identifier dp

identifierdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#identifier

has super-properties
d3fend-catalog-data-property dp, top data property
has sub-properties
CPE dp, ID dp, external ID dp, has URL op, import ID dp, team ID dp, template ID dp, user ID dp
has range
string

impact scoredp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/cvssImpactScore

has characteristics: functional

has super-properties
top data property
has domain
vulnerability c
has range
decimal

import IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/importId

has super-properties
identifier dp

isdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/stringValue

the object is represented by the following string value
has domain
Observable c
has range
string

kb-reference-titledp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#kb-reference-title

has super-properties
d3fend-kb-data-property dp
has domain
Reference c
has range
string

last accesseddp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastAccessedEpoch

has super-properties
has epoch dp

last modifieddp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastUpdatedEpoch

has super-properties
has epoch dp

last modifieddp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/last_modified

has super-properties
modified at dp

last seendp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastSeen

The last time the entity had been observed by the application.
has super-properties
seen at dp

last seendp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastSeenEpoch

has super-properties
has epoch dp

last status changedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastStatusChangeEpoch

has super-properties
has epoch dp

last updated atdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/lastUpdated

has super-properties
modified at dp

modified atdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/updated

has super-properties
has timestamp dp
has sub-properties
last modified dp, last updated at dp

namedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#name

has super-properties
d3fend-catalog-data-property dp
is also defined as
annotation property

operating-systemdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#operating-system

has super-properties
d3fend-catalog-data-property dp
has domain
Capability Implementation c
has range
string

Prioritydp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extPriority

Priority as defined by the 3rd party vendor responsible for creating the Artifact.

has characteristics: functional

has super-properties
classification dp

process-command-line-argumentsdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-command-line-arguments

has super-properties
process-data-property dp

process-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-data-property

process-environmental-variablesdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-environmental-variables

has super-properties
process-data-property dp

process-identifierdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-identifier

has super-properties
process-data-property dp

process-security-contextdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#process-security-context

has super-properties
process-data-property dp
has domain
Process c

ratingdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#rating

has characteristics: functional

has super-properties
d3fend-catalog-data-property dp

Riskdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extRisk

Risk as defined by the 3rd party vendor responsible for creating the Artifact.
has super-properties
classification dp

S3 bucket namedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/importBucketName

S3 bucket URLop back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/importBucketUrl

has characteristics: functional

has range
anyURI
is also defined as
object property

seen atdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/timeSeen

A timestamp associated with a point in time when the entity had been observed by the application in some way.
has super-properties
has timestamp dp
has sub-properties
first seen dp, last seen dp

Severitydp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extSeverity

Severity as defined by the 3rd party vendor responsible for creating the Artifact.

has characteristics: functional

has super-properties
classification dp

stagedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#stage

Represents a distinct phase in the lifecycle of cybersecurity operations or activities. It is a conceptual categorization used to classify and organize various processes, techniques, tools, or actions according to their role or function in the broader context of cybersecurity defense strategies. Each stage reflects a specific aspect or phase of cybersecurity practice, such as detection, prevention, response, recovery, or analysis, providing a structured framework for understanding and implementing effective cybersecurity measures.

has characteristics: functional

has super-properties
d3fend-catalog-data-property dp

statusdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extStatus

Status of the Artifact as defined by the 3rd party vendor software responsible for generating it.
has super-properties
vendor property dp

team IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/teamId

has characteristics: functional

has super-properties
identifier dp

template IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/templateId

has characteristics: functional

has super-properties
identifier dp

textdp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#text

has super-properties
d3fend-catalog-data-property dp

Threat Leveldp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extThreat

Threat Level as defined by the 3rd party vendor responcible for creating the Artifact.
has super-properties
classification dp

titledp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#title

has super-properties
d3fend-catalog-data-property dp
has range
string

typedp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extType

has super-properties
vendor property dp

Urgencydp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/extUrgency

Urgency as defined by the 3rd party vendor responsible for generating the Artifact.

has characteristics: functional

has super-properties
classification dp

user IDdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/userId

has characteristics: functional

has super-properties
identifier dp

uses portdp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/usesNetworkPort

uses network port number
has range
positive integer

vectordp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/vectorString

has characteristics: functional

has super-properties
top data property
has domain
vulnerability c
has range
string

vendor propertydp back to ToC or Data Property ToC

IRI: https://mekanoid.io/ontology/vendorProperty

has sub-properties
category dp, classification dp, external ID dp, status dp, type dp

versiondp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#version

has characteristics: functional

has super-properties
d3fend-catalog-data-property dp, d3fend-external-control-data-property dp
has domain
Capability Implementation c or Control Catalog c
has range
integer or string

windows-registry-data-propertydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#windows-registry-data-property

has super-properties
d3fend-artifact-data-property dp
has sub-properties
windows-registry-key dp, windows-registry-value dp

windows-registry-keydp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#windows-registry-key

has super-properties
windows-registry-data-property dp

windows-registry-valuedp back to ToC or Data Property ToC

IRI: http://d3fend.mitre.org/ontologies/d3fend.owl#windows-registry-value

has super-properties
windows-registry-data-property dp

Legend back to ToC

c: Classes
op: Object Properties
dp: Data Properties